Questions tagged [identification]
The identification tag has no usage guidance.
87
questions
1
vote
1
answer
69
views
Is electronic signature a proper/sufficient mean for identification/authentication?
We have received an electronically signed GDPR data request from a person who has only provided his name and surname. We wanted to be sure that this person is who he claims he is, so we have asked to ...
0
votes
0
answers
119
views
Retrieving Android phone's identifiers
I will be publishing a fingerprinting app that shows its user how much access to their Android phone's identifiers it has. I haven't started writing it because I need to understand how can any Android ...
0
votes
1
answer
1k
views
Identifying a ransomware with .mkp file extensions
Yesterday, a ransomware hit my PC. I didn't pay the ransom and didn't comply with what the attackers were asking for and I wiped everything and every drive on my PC and then reinstalled my stuff from ...
0
votes
1
answer
666
views
Fraud Detection - 2FA Bypass Methods and SIM Cloning
I am assisting another Data Scientist with helping a bank detect and prevent fraud via data analysis and predictive modeling (Machine Learning). It's a challenge because the proportion of known ...
0
votes
1
answer
573
views
How malware file signature is generated?
How is the malware file signature generated? Does it use a sequence of bytes in the beginning, size, PE (export, import, section), etc?
And can the MD5 or SHA256 be considered a file signature for a ...
1
vote
1
answer
140
views
How can websites fingerprint the company I work for?
During my work day, I came upon a website that had a popup that identified the company I work for(basically saying "contact us X company"). This website was never previously visited, cookies ...
1
vote
1
answer
2k
views
What traces are left on a USB stick after using it?
If one uses a FAT32-formatted USB stick on Windows, Linux, or Android, would there be a way to determine on which computer the USB stick was used by examining the USB stick?
I know OS can log which ...
3
votes
1
answer
1k
views
Guidance on Storing Email Addresses as Hashes
I am building an application where one user (User A) can store a "query" of another user (User B) that may or may not exist in the system. This query can be done by email address.
The ...
0
votes
0
answers
200
views
How reliable is a mathematical model of a human fingerprint for identification?
How reliable is a mathematical model of a human fingerprint for identification?
I am looking for a way to uniquely identify individuals that is very reliable and easy to use that does not require ...
0
votes
1
answer
234
views
Can we prevent users from generating a QR code with edited information
Currently there is this design of two apps that work together:
Proof app: On customers phone, takes in a textcode and creates a QR code
Scanner app: On hosts phone, Scans the QR code and displays ...
3
votes
1
answer
1k
views
Nonprofit organizations asking me to email them a photo of my driver's license
Recently I've had two nonprofit organizations ask me to email them a photo of my driver's license. No money is changing hands, and both of these are legitimate and well-known nonprofits.
Organization ...
1
vote
1
answer
952
views
May I use OAuth2 for non third-party applications?
I need some help to understand my problem.
I'm studying a way to provide authentication for my applications.
My scenario:
I have a set of APIs with restricted access and users that will be ...
0
votes
2
answers
263
views
What is the current state of author recognition software and what can be done about it?
I'm curious what the current state of author recognition software is, i.e. software that detects the author of a certain anonymous text based on a certain pool of texts obtained from elsewhere. This ...
5
votes
2
answers
2k
views
Very strange gibberish strings with Cyrillic characters that appear in random websites and elsewhere
In my work with online orders, I started noticing an extreme abnormality in a few orders. In one field that wasn't restricted there appeared a string of over 3 million characters that were totally ...
0
votes
0
answers
459
views
Reproducible method to generate an anonymous identifier?
I've been working on a web application that needs to provide a way to create an anonymous identifier that can be used to identify one or more rows in a database that refer to a person who has called ...