Skip to main content

Questions tagged [keys]

For questions regarding encryption keys

1 vote
1 answer
116 views

Long dictionary/map key vs shorter key + equality check for an auth cache

I'm implementing an API key based authentication scheme and I'm caching valid API key entries (hash, scope etc.) in a memory cache. For the cache key, I had been using the first 8 characters of the ...
Kyohei Kaneko's user avatar
1 vote
0 answers
68 views

Which 'Fkey' can I safely use in a cross-platform application?

I'm developing a text editor and start to think about key bindings. Which F key (F1, F2, F11, etc.) should I use in my application, assuming that I want OS X users to be able to use it as well? I don'...
atrefeu's user avatar
  • 119
1 vote
2 answers
1k views

Composite Id based on another Aggregate root?

An Aggregate Root should always have a unique ID within the bounded context. Typically the examples one finds use a GUID for this to ensure global uniqueness. However consider a bounded context for a ...
udnes99's user avatar
  • 59
0 votes
1 answer
282 views

Google Analytics API Key Security

When dealing with an API key (in this case a JSON file used to connect to the Google Analytics API), what is the appropriate way to securely store the keyfile? "Your new public/private key pair ...
Sean Payne's user avatar
-1 votes
2 answers
134 views

Detecting keyboard "callbacks" directly from a keyboard not from a operating system

So, I am making a pure 2D shooter in Unity, and I was thinking about cheats a little bit (Yes, I know that nobody is going to play my game but anyway). I was wondering if you can get pressed keys ...
Peter Veris's user avatar
-2 votes
1 answer
304 views

Store line numbers of CSV in the database

In our environment, we often have to import CSV files into a database, where each line represents a record. Though there is no actual business use case for storing the original line numbers inside the ...
Eugene Lycenok's user avatar
-4 votes
1 answer
129 views

Is it bad to leave Azure secrets keys as plaintext in my source code if I don't release the code, only the exe? [closed]

Specifically worried that someone might be able to extract the API key in a way I am unaware of and make calls to my own Cognitive Services subscription outside of the context of my program.
J. Doe's user avatar
  • 11
0 votes
1 answer
627 views

How to manage user serial keys for an application

I have an application in C# where several users access it. Each user will have a serial key associated with his username in a table users in a local MySQL database. Example of the table users: User ...
Lorenzo Belfanti's user avatar
2 votes
1 answer
2k views

How to store private ssh keys for my application?

I 've a pair of private and public ssh keys, which I'm using in encrypting and decrypting my JWT. So I'm creating and signing my JWT with my private key and shared the public key with the client who ...
megamind79's user avatar
0 votes
2 answers
152 views

How do companies store private keys offline but still sign code with them?

I've heard that companies store their private keys offline "in a safe that will never be opened" and stuff like that (the context for this is a console developer like Microsoft keeping the Xbox ...
UnicornsOnLSD's user avatar
-1 votes
3 answers
419 views

When to use a reserved word, null or undefined as a key in an object?

I have a case where I have a dictionary object and a value with no key. The object can have the system values and then a user value. I have to store that value. I could use a reserved word or I ...
1.21 gigawatts's user avatar
1 vote
1 answer
32 views

Geolocation client side requests: Key and ID storage

I'm developing a small web-app to help users manage shopping lists. One of the required features is the ability of the application to notify the user if a shop of the same category is near him/her. ...
MFranc's user avatar
  • 113
1 vote
2 answers
1k views

How should I access a third party API which requires a key?

I am accessing a third-party API. It requires a key, which is the same key for all of my users. Currently, my application includes that key in the client-side code, and calls the third party API ...
Evorlor's user avatar
  • 1,563
0 votes
1 answer
1k views

Sharing public key certificate

I'm working on a piece of software in Visual Studio. I created a PKCS#12 archive in Visual Studio to strong name sign my assemblies. I then extracted the public key from the archive using OpenSSL. I ...
user651351's user avatar
6 votes
2 answers
3k views

Right way to spread secret keys between microservices

I have a few services that sign some data with an asymmetric cryptography algorithm (like RSA). I need to spread some secret (private) keys between all instances of the service. I've found a few ways ...
rootatdarkstar's user avatar

15 30 50 per page