Tagged articles
14 articles
Page 1 of 1
Black & White Path
Black & White Path
May 8, 2026 · Information Security

Why VECT Ransomware Fails to Decrypt Large Files: A Technical Breakdown

Security researchers discovered that VECT ransomware unintentionally embeds the ChaCha20 key and nonce for files under 128 KB, allowing easy decryption, while its chunked encryption of larger files loses three of four nonces, rendering those files permanently unrecoverable even after ransom payment.

ChaCha20VECTencryption bug
0 likes · 5 min read
Why VECT Ransomware Fails to Decrypt Large Files: A Technical Breakdown
Architect
Architect
Oct 1, 2025 · Information Security

How to Secure Third‑Party APIs with AK/SK, Signatures, Tokens and Anti‑Replay Measures

This article presents a comprehensive guide to designing secure third‑party APIs, covering the generation and management of Access Key/Secret Key pairs, signature creation, timestamp and nonce anti‑replay techniques, token handling, request throttling, IP whitelisting, idempotency, versioning, response standards, and practical code examples in Java and SQL.

AK/SKAPI SecurityAuthentication
0 likes · 32 min read
How to Secure Third‑Party APIs with AK/SK, Signatures, Tokens and Anti‑Replay Measures
Top Architecture Tech Stack
Top Architecture Tech Stack
Mar 25, 2025 · Information Security

Designing Secure Third‑Party API Interfaces: Authentication, Signature, and Best Practices

This guide details a secure third‑party API design, covering API key generation, request signing with timestamps and nonces, permission division, CRUD endpoint definitions, unified response structures, and best‑practice security measures such as HTTPS, IP whitelisting, rate limiting, logging, and idempotency handling.

API SecurityAuthenticationBackend
0 likes · 29 min read
Designing Secure Third‑Party API Interfaces: Authentication, Signature, and Best Practices
Architecture Digest
Architecture Digest
Apr 24, 2024 · Information Security

Secure Third‑Party API Design: AK/SK, Token, Signature, Timestamp & Nonce

The article presents a comprehensive guide to designing secure third‑party APIs, covering access‑key/secret‑key generation, token management, signature algorithms, timestamp and nonce anti‑replay mechanisms, permission granularity, request logging, rate limiting, and example Java and SQL implementations.

Access KeySecret KeyToken
0 likes · 28 min read
Secure Third‑Party API Design: AK/SK, Token, Signature, Timestamp & Nonce
ITPUB
ITPUB
Jul 4, 2022 · Information Security

10 Proven Strategies to Secure API Interfaces: Encryption, Signing, Tokens & More

This article outlines ten practical methods for protecting API data, covering transmission encryption, digital signatures, token authentication, timestamp and nonce mechanisms, rate limiting, blacklist/whitelist controls, data masking, and parameter validation to ensure comprehensive interface security.

API SecurityParameter Validationdata masking
0 likes · 14 min read
10 Proven Strategies to Secure API Interfaces: Encryption, Signing, Tokens & More
Laravel Tech Community
Laravel Tech Community
May 16, 2022 · Information Security

Preventing Replay Attacks with Timestamps and Nonces in PHP

The article explains replay attacks, describes how using a timestamp, a nonce, or a combination of both can protect API requests, and provides complete PHP code examples for signing and verifying requests to ensure each call is accepted only once.

PHPReplay attacknonce
0 likes · 7 min read
Preventing Replay Attacks with Timestamps and Nonces in PHP
Senior Brother's Insights
Senior Brother's Insights
Jan 14, 2018 · Blockchain

Avoid Underpriced Replacement Errors by Managing Nonce in Hot Ethereum Accounts

When a frequently used Ethereum account (hot account) sends multiple transactions, an incorrect nonce can cause the 'replacement transaction underpriced' error, but by understanding pending transactions, gas price requirements, and choosing either client‑managed or custom nonce strategies, developers can reliably prevent and resolve this issue.

Ethereumhot accountsnonce
0 likes · 5 min read
Avoid Underpriced Replacement Errors by Managing Nonce in Hot Ethereum Accounts