Is it safe to use Macbook pro M1 on bed?

Is it safe to use Macbook pro M1 on bed? – Ask Different

vulnerability – Ubuntu CVE Score – Gained acces level:None – Does it mean personal data is safe on ubuntu?

I was studying the following page listing all the vulnerabilities of ubuntu. CVE Ubuntu

What I found surprising is that all vulnerabilities report that “gained access level: None”. Does that mean that there does not exist any known vulnerability which lets an attacker access your data? Does this presume that the data is encrypted with out of the box eCryptfs encryption or is it even safe without?

Is MyTrip.com safe to use?

I’ve found an itinerary on MyTrip.com that’s well priced and can’t seem to replicate the same fare on Google Flights. Is it safe to use?

How safe is Trezor Model T’s 12 word recovery seed vs 24 word seed?

I saw a someone post this question here, but that was 6 years ago. How much safer is a 24 word seed vs Trezors 12 word seed? How easily can it be bruteforced? If you intend to keep your crypto for at least 10 years, maybe 12 words is not enough?

Installing Android 7.0 on Nexus 7 2013. Is it SAFE?

Too many of my apps are no longer functional on Android 6. Is it safe to install the unofficial version 7 ROM? I don’t want to risk bricking my tablet.
Thanks for advice.

Is it safe to hash “a password already hashed with Argon2 on the client-side” with SHA-256 on the server-side? What about an authentication token?

I am trying to achieve better security in my authentication system implementation with both server-side hashing and client-side hashing. (See the first reference below for more prerequisite knowledge.)

As I understand it:

  1. Client-side hashing prevents hackers from getting a user’s plaintext password and using it for other sites when the server app is compromised.
  2. Server-side hashing prevents hackers from logging in as users when the server database is compromised.
  3. KDFs such as Argon2 make it expensive for hackers to brute-force a list/dictionary of common or possible plaintext passwords against a hashed password.

I’d like the save some server computing resources. So here comes my question: is it safe to directly hash “a password already hashed with Argon2 on the client-side” on the server-side with SHA-256? Here I mean “safe” by it’s at least as safe as using server-side only Argon2. Besides, The second reference below also suggests hashing the authentication token (the so-called “validator” in their article) with SHA-256. Is doing this safe?

My answer: an Argon2-hashed password or an authentication token with a length of at least 16 bytes should be safe. The reasons are:

  1. There is no list/dictionary to try since the data is a byte string that can be anything.
  2. A full rainbow table of all 16-byte-long keys should contain 2 ^ 128 entries, which takes at least 2 ^ 128 * 32 B = 2 ^ 133 B ≈ 8 * 10 ^ 39 B = 8 * 10 ^ 27 TB of storage, which is way too big.
  3. Even if we take the peak Bitcoin hash rate till now 170000 Phash/s, it will still take 10 ^ 12 years to enumerate all the possibilities.

However, I am no security expert so I am not sure whether there are any other flaws. So it would be nice if someone professional could share his/her opinion on this.

PS: Here are the related articles and questions I have read and think are useful, and got me into this question.

  1. authentication – Why is client-side hashing of a password so uncommon? – Information Security Stack Exchange
  2. Implementing Secure User Authentication in PHP Applications with Long-Term Persistence (Login with “Remember Me” Cookies) – Paragon Initiative Enterprises Blog
  3. Password Storage – OWASP Cheat Sheet Series

network – What are all the services that are shown in the output of nmap ? Are they safe?

I am trying to find out all the vulnerabilities associated with my application and data server (both on the same machine). So I’ve decided to run nmap to see all the ports and other information that an invader could gain to attack my servers. The result of nmap shows many services and now I am very paranoid and alarmed that what exactly are those services and should I take any action in that regard. I ran a complete nmap against the IP of my server please if you see any vulnerability that needs to be taken care of, please let me know.

The XML result of my scan :

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE nmaprun>
<?xml-stylesheet href="file:///C:/Program Files (x86)/Nmap/nmap.xsl" type="text/xsl"?>
<!-- Nmap 7.91 scan initiated Tue Jun 15 01:16:20 2021 as: nmap -O -sA -sV -v -oX E:\out4  
0.100.110.1 -->
<nmaprun scanner="nmap" args="nmap -O -sA -sV -v -oX E:\out4 10.100.110.1" start="1623703580" 
startstr="Tue Jun 
15 01:16:20 2021" version="7.91" xmloutputversion="1.05">

<scaninfo type="ack" protocol="tcp" numservices="1000" services="1,3-4,6-7,9,13,17,19- 
26,30,32-33,37,42-43,49,53,70,79-85,88-90,99-100,106,109-111,113,119,125,135,139,143- 
144,146,161,163,179,199,211-212,222,254-256,259,264,280,301,306,311,340,366,389,406-407,416- 
417,425,427,443-445,458,464-465,481,497,500,512-515,524,541,543-545,548,554 
555,563,587,593,616-617,625,631,636,646,648,666- 
668,683,687,691,700,705,711,714,720,722,726,749,765,777,783,787,800 
801,808,843,873,880,888,898,900-903,911-912,981,987,
990,992-993,995,999-1002,1007,1009-1011,1021-1100,1102,1104-1108,1110-1114,1117,1119,1121- 
1124,1126,1130-1132,1137-1138,1141,1145,1147-1149,1151-1152,1154,1163-1166,1169,1174- 
1175,1183,1185-1187,1192, 1198-1199,1201,1213,1216-1218,1233-1234,1236,1244,1247- 
1248,1259,1271-1272,1277,1287,1296,1300-1301, 1309-1311,1322,1328,1334,1352,1417,1433- 
1434,1443,1455,1461,1494,1500-1501,1503,1521,1524,1533,1556,
1580,1583,1594,1600,1641,1658,1666,1687-1688,1700,1717-1721,1723,1755,1761,1782- 
1783,1801,1805,1812,1839-1840,1862-1864,1875,1900,1914,1935,1947,1971-1972,1974,1984,1998- 
2010,2013,2020-2022,2030,2033-2035, 2038,2040-2043,2045-2049,2065,2068,2099-2100,2103,2105- 
2107,2111,2119,2121,2126,2135,2144,2160-2161,
2170,2179,2190-2191,2196,2200,2222,2251,2260,2288,2301,2323,2366,2381-2383,2393- 
2394,2399,2401,2492,
2500,2522,2525,2557,2601-2602,2604-2605,2607-2608,2638,2701-2702,2710,2717 
...... ***AND SO MANY OTHERS***"/>

<verbose level="1"/>
<debugging level="0"/>
<taskbegin task="ARP Ping Scan" time="1623703581"/>
<hosthint><status state="up" reason="arp-response" reason_ttl="0"/>
<address addr="10.100.110.1" addrtype="ipv4"/>
<address addr="00:90:FB:--:--:--" addrtype="mac" vendor="Portwell"/>
<hostnames>
</hostnames>
</hosthint>
<taskend task="ARP Ping Scan" time="1623703581" extrainfo="1 total hosts"/>
<taskbegin task="Parallel DNS resolution of 1 host." time="1623703581"/>
<taskend task="Parallel DNS resolution of 1 host." time="1623703581"/>
<taskbegin task="ACK Scan" time="1623703581"/>
<taskend task="ACK Scan" time="1623703586" extrainfo="1000 total ports"/>
<taskbegin task="Service scan" time="1623703586"/>
<taskbegin task="NSE" time="1623703588"/>
<taskend task="NSE" time="1623703588"/>
<taskbegin task="NSE" time="1623703588"/>
<taskend task="NSE" time="1623703589"/>
<host starttime="1623703581" endtime="1623703589"><status state="up" reason="arp-response" 
reason_ttl="0"/>
<address addr="10.100.110.1" addrtype="ipv4"/>
<address addr="00:90:FB:--:--:--" addrtype="mac" vendor="Portwell"/>
<hostnames>
</hostnames>
<ports><extraports state="filtered" count="995">
<extrareasons reason="no-responses" count="995"/>
</extraports>
<port protocol="tcp" portid="80"><state state="unfiltered" reason="reset" reason_ttl="64"/> 
<service name="http" method="table" conf="3"/></port>
<port protocol="tcp" portid="443"><state state="unfiltered" reason="reset" reason_ttl="64"/> 
<service name="https" method="table" conf="3"/></port>
<port protocol="tcp" portid="8009"><state state="unfiltered" reason="reset" reason_ttl="64"/> 
<service name="ajp13" method="table" conf="3"/></port>
<port protocol="tcp" portid="8080"><state state="unfiltered" reason="reset" reason_ttl="64"/> 
<service name="http-proxy" method="table" conf="3"/></port>
<port protocol="tcp" portid="9100"><state state="unfiltered" reason="reset" reason_ttl="64"/> 
<service name="jetdirect" method="table" conf="3"/></port>
</ports>
<os><osmatch name="Citrix Access Gateway VPN gateway" accuracy="90" line="19121">
<osclass type="proxy server" vendor="Citrix" osfamily="embedded" accuracy="90"/>
</osmatch>
<osmatch name="Linux 2.6.11" accuracy="90" line="47658">
<osclass type="general purpose" vendor="Linux" osfamily="Linux" osgen="2.6.X" accuracy="90"> 
<cpe>cpe:/o:linux:linux_kernel:2.6.11</cpe></osclass>
</osmatch>
<osmatch name="Linux 2.6.18" accuracy="90" line="48967">
<osclass type="general purpose" vendor="Linux" osfamily="Linux" osgen="2.6.X" accuracy="90"> 
<cpe>cpe:/o:linux:linux_kernel:2.6.18</cpe></osclass>
</osmatch>
<osmatch name="Linux 2.6.18.8 (openSUSE 10.2)" accuracy="90" line="50376">
<osclass type="general purpose" vendor="Linux" osfamily="Linux" osgen="2.6.X" accuracy="90"> 
<cpe>cpe:/o:linux:linux_kernel:2.6.18.8</cpe></osclass>
</osmatch>
<osmatch name="Linux 2.6.18.8 (openSUSE 10.2, SMP)" accuracy="90" line="50394">
<osclass type="general purpose" vendor="Linux" osfamily="Linux" osgen="2.6.X" accuracy="90"> 
<cpe>cpe:/o:linux:linux_kernel:2.6.18.8</cpe></osclass>
</osmatch>
<osmatch name="Linux 2.6.20.6" accuracy="90" line="50744">
<osclass type="general purpose" vendor="Linux" osfamily="Linux" osgen="2.6.X" accuracy="90"> 
<cpe>cpe:/o:linux:linux_kernel:2.6.20.6</cpe></osclass>
</osmatch>
<osmatch name="Linux 2.6.23" accuracy="90" line="51987">
<osclass type="general purpose" vendor="Linux" osfamily="Linux" osgen="2.6.X" accuracy="90"> 
<cpe>cpe:/o:linux:linux_kernel:2.6.23</cpe></osclass>
</osmatch>
<osmatch name="OpenWrt Chaos Calmer 15.05 (Linux 3.18)" accuracy="90" line="62171">
<osclass type="broadband router" vendor="Linux" osfamily="Linux" osgen="3.X" accuracy="90"> 
<cpe>cpe:/o:linux:linux_kernel:3.18</cpe></osclass>
</osmatch>
<osmatch name="Linux 3.10 - 4.11" accuracy="90" line="63442">
<osclass type="general purpose" vendor="Linux" osfamily="Linux" osgen="3.X" accuracy="90"> 
<cpe>cpe:/o:linux:linux_kernel:3</cpe></osclass>
<osclass type="general purpose" vendor="Linux" osfamily="Linux" osgen="4.X" accuracy="90"> 
<cpe>cpe:/o:linux:linux_kernel:4</cpe></osclass>
</osmatch>
<osmatch name="Linux 3.10 - 4.4" accuracy="90" line="63470">
<osclass type="general purpose" vendor="Linux" osfamily="Linux" osgen="3.X" accuracy="90"> 
<cpe>cpe:/o:linux:linux_kernel:3</cpe></osclass>
<osclass type="general purpose" vendor="Linux" osfamily="Linux" osgen="4.X" accuracy="90"> 
<cpe>cpe:/o:linux:linux_kernel:4</cpe></osclass>
</osmatch>
</os>
<distance value="1"/>
<times srtt="212" rttvar="419" to="100000"/>
</host>
<runstats><finished time="1623703589" timestr="Tue Jun 15 01:16:29 2021" summary="Nmap done at 
Tue Jun 15 01:16:29 2021; 1 IP address 
(1 host up) scanned in 9.89 seconds" elapsed="9.89" exit="success"/><hosts up="1" down="0" 
total="1"/>
</runstats>
</nmaprun>

Safe or Unsafe to Store Passwords in Chrome on MacOS?

I’ve seen conflicting opinions on this, more than the below, but i.e.

Unsafe: https://www.techrepublic.com/article/why-you-should-never-allow-your-web-browser-to-save-your-passwords/

Safe: https://cybersecuritymagazine.com/8-reasons-to-use-google-password-manager/

Also this older question, closed as unfocused, and basically answered as “it depends”: Is it safe to store passwords in a Browser?

So I’m specifically asking about Google Chrome (v92.0.4515.159, released 2021-08-19) running on MacOS (v11.3, released 2021-04-26) without any configuration changes (Chrome default settings for its password manager)

EDIT: There’s also this much older question:
Password management in Firefox, Chrome and Safari
but given it’s 8 years old, I think an updated/modern answer (and specific to the OS/Browser) is still a valid question – open to deleting if community finds it duplicate/not answerable though)

How to resolve – DELL PowerEdge R410 the system board fault fail safe voltage is outside of the allowable range

I’ve a problem with my server Dell because after I did the maintence, the server can’t start correctly, the power supply fan works just a 15 seconds and shutdown

Is it safe to open email links in a private window?

Sometimes there are links on the email you have to click because they are agrements, but they are coming from a different URL. As of now what I’m doing is opening a private window and pasting the link there. Would this be an effective anti-phishing mechanism? Or can you still get hacked?

The reason behind my thinking of a new private window is that it doesn’t expose cookies and passwords to that window. Besides that what are other dangers that could arise?

What is the best way to click on email links then?

Thanks

DreamProxies - Cheapest USA Elite Private Proxies 100 Private Proxies 200 Private Proxies 400 Private Proxies 1000 Private Proxies 2000 Private Proxies 5000 Private Proxies ExtraProxies.com - Buy Cheap Private Proxies Buy 50 Private Proxies Buy 100 Private Proxies Buy 200 Private Proxies Buy 500 Private Proxies Buy 1000 Private Proxies Buy 2000 Private Proxies ProxiesLive.com Proxies-free.com New Proxy Lists Every Day Proxies123.com Buy Cheap Private Proxies; Best Quality USA Private Proxies