Skip to main content
We’ve updated our Terms of Service. A new AI Addendum clarifies how Stack Overflow utilizes AI interactions.

Questions tagged [compression]

the act of compression reduces the size of the file(s) being compressed by encoding information and eliminating statistical redundancy.

Filter by
Sorted by
Tagged with
0 votes
2 answers
163 views

The general consensus on enabling SSL Compression is "don't" because of the CRIME exploit. However, this exploit seems to have been mitigated in 2012. I want to know: Should I still avoid ...
Kingsley's user avatar
  • 103
2 votes
1 answer
366 views

I'm reading about Error Level Analysis (ELA) in image forensics as means to detect if modifications were made to a photo. ELA is nicely described here: https://fotoforensics.com/tutorial.php?tt=ela. ...
Bob Ortiz's user avatar
  • 7,715
1 vote
1 answer
191 views

Let's assume an API returns sensitive information (e.g. medical or financial) to authenticated users only. In some circumstances responses may include information the user supplied in the request (e.g....
Joseph's user avatar
  • 13
2 votes
4 answers
2k views

I have a backend for a mobile application that has to serve large JSON responses from time to time, the transfer would be greatly helped by enabling compression, especially when the user has bad ...
JohanShogun's user avatar
1 vote
2 answers
452 views

I have read up on compressed folders of file types such as .zip, .rar and .7zip being the malicious file itself (excluding cases such as an .exe file being disguised as a .zip file etc...), only ...
ReaLiTy-UnFatHom's user avatar
1 vote
1 answer
348 views

Could someone please explain this to me: When you use a fuzzy hash algorithm (ssdeep, tlsh, sdhash... or any other) to calculate the hash value of a file, does it calculate the hash based on the whole ...
Moooz's user avatar
  • 55
24 votes
2 answers
6k views

I've had a look within the official TLS specification but I cannot see any mention of this. Does TLS allow compression to be disabled? Or is it mandatory?
intrigued_66's user avatar
1 vote
1 answer
173 views

I use LUKS to encrypt all sensitive data on my computer. If I switch to using a filesystem with on-the-fly data compression such as ZFS, should I use its compression feature together with LUKS? Does ...
CurtisB's user avatar
  • 43
0 votes
1 answer
3k views

I'm not an expert of security. I heard it's not recommended to enable GZIP compression for HTTPS requests, that would open a security issue (see SO answer: https://stackoverflow.com/a/4063496/17307650 ...
Zorgatone's user avatar
  • 135
5 votes
0 answers
1k views

There is a well-known threat named compression bombs. Such image formats as PNG and JPEG use compression methods, and therefore and in theory PNG/JPEG images might be a compression-bomb. I've found an ...
salazar324's user avatar
0 votes
1 answer
374 views

lets say I have a rar file that has a bunch of images inside. Is there any risk of opening the image inside the rar without extracting the entire file?
zhili wang's user avatar
8 votes
1 answer
888 views

Assume sensitive audio emissions from a mechanical keyboard. These audio emissions are often sufficient to reconstruct the actual key presses that generated the sound. If the audio is compressed using ...
forest's user avatar
  • 67.8k
5 votes
2 answers
3k views

I'm having a hard time knowing whether the following setup is vulnerable to CRIME/BREACH type attacks (which target HTTPS). I am running a Wireguard VPN that tunnels VXLAN protocol, using ChachaPoly20 ...
Orsiris de Jong's user avatar
1 vote
0 answers
485 views

The challenge data is: ...
CtfLover's user avatar
3 votes
3 answers
946 views

I want to archive some GB of sensitive data. It is to be stored on an external drive that also includes non sensitive data so i don't want to encrypt the whole drive. For that purpose i want to use ...
WiCloverS18's user avatar
0 votes
1 answer
227 views

Assuming whatever encryption algorithm used was designed to support compression without any information leakage, would there be any reason not to use some custom compression algorithm to add obscurity ...
mwpuppire's user avatar
5 votes
3 answers
2k views

Section 5.4 of the TLS 1.3 specification describes record padding. One of the mitigations for BREACH is to add random padding. Therefore, I'm wondering: Does TLS 1.3 require random record padding? I'...
candrews's user avatar
  • 151
13 votes
1 answer
3k views

When using compression on openssh (a la ssh -C ...), does this reduce entropy and make the tunnel traffic more vulnerable to cryptanalysis? Is compression an option I should disable server-side for ...
TopherIsSwell's user avatar
3 votes
1 answer
1k views

Learning a bit about IT security, a segment of the material was the basics of steganography - specifically, hiding information in the lowest significance bits of images, and converting images into ...
sisisisi's user avatar
  • 193
6 votes
2 answers
5k views

After reading some popular questions and answer on this website about BREACH, the only advice seems to be: don't compress anything that might contain secrets (including CSRF tokens). However, that ...
reed's user avatar
  • 16k
1 vote
1 answer
2k views

I lost my winrar password of my file. I need to access it. Is it possible? If yes, how?
Stan.E's user avatar
  • 21
2 votes
1 answer
167 views

Solitaire is a method for encrypting messages by hand. Reading it though, the only advantage the Solitaire has over a one time pad is that it can encrypt longer messages. It requires a new, random key ...
Christopher King's user avatar
8 votes
1 answer
4k views

A Zip bomb (concept here) seems quite a "smart" and easy vulnerability to websites where uploading ZIP files is allowed. Such sites are under a threat (at least to make some degree of damage to them) -...
T.Todua's user avatar
  • 2,747
0 votes
1 answer
153 views

Using compression utilities, is it possible to create an archive that when extracted, will place certain files in certain areas on a users PC? For example, suppose if I wrote a virus or a malicious ...
user avatar
0 votes
1 answer
799 views

I know that there are multiple HTTP Compression tools out there. In order to entirely prevent a site from being susceptible to BREACH, which HTTP Compression algorithm should I use? Also, how ...
JohnFF's user avatar
  • 144
3 votes
1 answer
309 views

Wiki on CRIME: CRIME <...> is a security exploit against secret web cookies RFC 2616 on Content-Encoding: The Content-Encoding entity-header <...> when present, its value indicates what ...
eddyP23's user avatar
  • 289
-5 votes
3 answers
3k views

I am trying to figure out how to get my source information to compile smaller using encrypted text. This could potentially change the game in transferring large-chunked data and offer security at the ...
DeerSpotter's user avatar
1 vote
1 answer
698 views

I came across some password protected ARJ files. What is the algorithm for ARJ encrypted files ? How to decrypt them ?
franck's user avatar
  • 180
0 votes
2 answers
692 views

First of all I am not very familiar with the world of encryption so please be nice. I have got a data that should store in an xml using NetDataContractSerializer. This xml file gets the size of from ...
KayJay's user avatar
  • 1
2 votes
0 answers
225 views

I have a single page application that is hosted at example.com that relies on api.example.com. The SPA sends user credentials (JWT token) in authorization header for every request. Let's suppose ...
J Doe's user avatar
  • 21
15 votes
1 answer
1k views

It was mentioned that JPEG should not be used between image creation and redaction of sensitive contents, because compression artifacts around the redacted area may leak information. Given how this ...
forest's user avatar
  • 67.8k
3 votes
2 answers
794 views

Currently, we know few compression attacks on the SSL/TLS protocol (such as Crime or Breach). I wonder for few days if these attacks are practicable on a mail server (smtp). Is CRIME attack ...
Arthur's user avatar
  • 33
2 votes
1 answer
122 views

How does an application control whether or not its http content is compressed? I am not talking about TLS level compression, but rather about the compression of https:// response bodies only. In ...
Frugal Guy's user avatar
0 votes
2 answers
707 views

In a previous posting on Which is a safe way to transfer a copy of a sensitive document?, I have received suggestions to compress and encrypt an attachment file using the options of utilities such as ...
XavierStuvw's user avatar
0 votes
0 answers
105 views

I follow the tutorial here: https://www.youtube.com/watch?v=g0RmclTe7Lo to pack calc.exe in windows 10 at C:\Windows\System32\calc.exe But I get the following error: What's the problem? It seems ...
william007's user avatar
4 votes
2 answers
1k views

I've read that encryption produces random data and compression works by removing patterns in data and as a consequence, encrypted data has high entropy. I'm a bit confused, though. The reason I'm ...
user6189164's user avatar
18 votes
8 answers
17k views

Imagine I wish to upload my sensitive personal information (photos, document scans, list of passwords, email backups, credit card information, etc.) on Google Drive (or any other cloud service). I ...
Neli's user avatar
  • 239
4 votes
2 answers
5k views

This article claims that zip bombs cannot be used today as modern systems are too smart for it and no victim is going to slowly unpack terrabytes of data so zip bombs are basically useless. Is this ...
Vegeta's user avatar
  • 41
11 votes
1 answer
3k views

It appears that Chrome, Firefox, and soon Edge, support the new Brotli compression algorithm over HTTPS only. I can't find anything on whether this new compression algorithm is susceptible to the ...
rink.attendant.6's user avatar
4 votes
1 answer
533 views

Zip files, GZip files, and likely others, include information about the contained file, including the uncompressed size of the file. However, when extracting these files the number is meaningless as ...
Tarka's user avatar
  • 141
0 votes
2 answers
485 views

Today it was posited to me that sha256 has a domain large enough to never encounter a collision and that because it is such a large domain and given that a reverse function was created for it, that ...
virus.cmd's user avatar
  • 101
1 vote
0 answers
901 views

Warez scene groups often compress their binary executables using UPX or similar software. I've heard somewhere that they do this to obscure the algorithms they use from other groups, but I find this ...
krispet krispet's user avatar
1 vote
4 answers
560 views

These days we observes trend to use HTTP over TLS (HTTPS) for all communication. It recommend all weighty Internet service vendors and that claims to good practice. But TLS suite have 3 options for ...
slonma's user avatar
  • 11
3 votes
1 answer
143 views

I have been provided a specification for an enhancement to one of my companies software products to allow extraction of uploaded compression files (just Zip currently) that will save and migrate the ...
Cyassin's user avatar
  • 535
1 vote
0 answers
297 views

The changelog for RAR 5 mentions the following: Features removed: authenticity verification feature did not provide the required level of reliability and was removed; ... I didn't find any ...
Paul's user avatar
  • 633
1 vote
2 answers
1k views

So I'm curious about a few aspects of compressed files (Zip, rar, 7z, etc), and how they impact hack-ability. There is enough on this subject that I'm not clear about (since this isn't a career of ...
Durge's user avatar
  • 19
0 votes
1 answer
3k views

I have this string encoded and compressed (link to full string) ...
matiq's user avatar
  • 3
2 votes
1 answer
595 views

I came across a problem very similar recently and wondered if anyone knew how to solve this. So say for example I have an RAR archive called archiveA.rar and a password to protect it the password is ...
munim_R's user avatar
  • 23
8 votes
3 answers
4k views

File compression utilities like Winrar or ZIP or 7zip encrypt the password and store it inside the archive. How safe is that? I mean you are giving away the archive with the password inside,it's not ...
microwth's user avatar
  • 2,473
3 votes
3 answers
278 views

I recently noticed that the assets sent to clients aren't gzipped or minified on either my companies intranet or its public facing website. I brought this to the attention of the networking ...
Luke's user avatar
  • 187