Timeline for Embedding data inside IDs, good idea?
Current License: CC BY-SA 3.0
12 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Jan 24, 2017 at 17:35 | comment | added | JimmyJames | Couple of questions: Hashes are one-way so what do you mean by "unhash"? Is there some reason that anything in this packet must be considered an id? Can you add non-id data to the packet? | |
| Jan 24, 2017 at 17:20 | history | edited | Tulains Córdova | CC BY-SA 3.0 |
edited body
|
| Jan 24, 2017 at 16:41 | comment | added | 9000 | How do you determine if a packet is noise? If you can do it locally, it seems a good idea to filter out noise without touching a DB. | |
| Jan 24, 2017 at 2:06 | comment | added | Paul | can you tell us a little more about how the Ids are assigned, where, and what the threat profile for hacking is? | |
| Jan 24, 2017 at 1:53 | comment | added | Robert Harvey | Well, I saw your edit. I'd say that, if the technique that you propose meets your stated goals without compromising security or causing other problems, then it's the "right" thing to do. | |
| Jan 24, 2017 at 1:51 | history | edited | Robert Harvey | CC BY-SA 3.0 |
deleted 2 characters in body
|
| Jan 24, 2017 at 1:36 | answer | added | Slawek | timeline score: 0 | |
| Jan 24, 2017 at 0:38 | history | edited | Logister | CC BY-SA 3.0 |
added 540 characters in body
|
| Jan 24, 2017 at 0:04 | answer | added | John Wu | timeline score: 2 | |
| Jan 23, 2017 at 23:42 | answer | added | Sam | timeline score: 1 | |
| Jan 23, 2017 at 23:28 | comment | added | Robert Harvey | Can you clarify the phrase "verify that the received IDs match internal data"? Also, what does "minimize processing" mean? Are you having performance problems that are directly impacting the application's ability to perform its job? More specifically, what use case/user story is achieved or improved by implementing your proposed modification, and how? | |
| Jan 23, 2017 at 23:25 | history | asked | Logister | CC BY-SA 3.0 |