Skip to main content
The 2024 Developer Survey results are live! See the results

Questions tagged [identification]

The tag has no usage guidance.

1 vote
1 answer
69 views

Is electronic signature a proper/sufficient mean for identification/authentication?

We have received an electronically signed GDPR data request from a person who has only provided his name and surname. We wanted to be sure that this person is who he claims he is, so we have asked to ...
ZygD's user avatar
  • 279
0 votes
0 answers
119 views

Retrieving Android phone's identifiers

I will be publishing a fingerprinting app that shows its user how much access to their Android phone's identifiers it has. I haven't started writing it because I need to understand how can any Android ...
CurtisB's user avatar
  • 33
0 votes
1 answer
1k views

Identifying a ransomware with .mkp file extensions

Yesterday, a ransomware hit my PC. I didn't pay the ransom and didn't comply with what the attackers were asking for and I wiped everything and every drive on my PC and then reinstalled my stuff from ...
newly-arrived guest's user avatar
0 votes
1 answer
666 views

Fraud Detection - 2FA Bypass Methods and SIM Cloning

I am assisting another Data Scientist with helping a bank detect and prevent fraud via data analysis and predictive modeling (Machine Learning). It's a challenge because the proportion of known ...
Hack-R's user avatar
  • 203
0 votes
1 answer
573 views

How malware file signature is generated?

How is the malware file signature generated? Does it use a sequence of bytes in the beginning, size, PE (export, import, section), etc? And can the MD5 or SHA256 be considered a file signature for a ...
0xh3xa's user avatar
  • 113
1 vote
1 answer
140 views

How can websites fingerprint the company I work for?

During my work day, I came upon a website that had a popup that identified the company I work for(basically saying "contact us X company"). This website was never previously visited, cookies ...
Joe's user avatar
  • 11
1 vote
1 answer
2k views

What traces are left on a USB stick after using it?

If one uses a FAT32-formatted USB stick on Windows, Linux, or Android, would there be a way to determine on which computer the USB stick was used by examining the USB stick? I know OS can log which ...
William's user avatar
  • 21
3 votes
1 answer
1k views

Guidance on Storing Email Addresses as Hashes

I am building an application where one user (User A) can store a "query" of another user (User B) that may or may not exist in the system. This query can be done by email address. The ...
Mike-E's user avatar
  • 185
0 votes
0 answers
200 views

How reliable is a mathematical model of a human fingerprint for identification?

How reliable is a mathematical model of a human fingerprint for identification? I am looking for a way to uniquely identify individuals that is very reliable and easy to use that does not require ...
polcott's user avatar
  • 93
0 votes
1 answer
234 views

Can we prevent users from generating a QR code with edited information

Currently there is this design of two apps that work together: Proof app: On customers phone, takes in a textcode and creates a QR code Scanner app: On hosts phone, Scans the QR code and displays ...
Dennis Jaheruddin's user avatar
3 votes
1 answer
1k views

Nonprofit organizations asking me to email them a photo of my driver's license

Recently I've had two nonprofit organizations ask me to email them a photo of my driver's license. No money is changing hands, and both of these are legitimate and well-known nonprofits. Organization ...
user avatar
1 vote
1 answer
952 views

May I use OAuth2 for non third-party applications?

I need some help to understand my problem. I'm studying a way to provide authentication for my applications. My scenario: I have a set of APIs with restricted access and users that will be ...
Simio's user avatar
  • 11
0 votes
2 answers
263 views

What is the current state of author recognition software and what can be done about it?

I'm curious what the current state of author recognition software is, i.e. software that detects the author of a certain anonymous text based on a certain pool of texts obtained from elsewhere. This ...
Sebastiaan van den Broek's user avatar
5 votes
2 answers
2k views

Very strange gibberish strings with Cyrillic characters that appear in random websites and elsewhere

In my work with online orders, I started noticing an extreme abnormality in a few orders. In one field that wasn't restricted there appeared a string of over 3 million characters that were totally ...
Khris's user avatar
  • 161
0 votes
0 answers
459 views

Reproducible method to generate an anonymous identifier?

I've been working on a web application that needs to provide a way to create an anonymous identifier that can be used to identify one or more rows in a database that refer to a person who has called ...
Dustin's user avatar
  • 1

15 30 50 per page
1
2 3 4 5 6