Skip to main content
12 events
when toggle format what by license comment
Jan 24, 2017 at 17:35 comment added JimmyJames Couple of questions: Hashes are one-way so what do you mean by "unhash"? Is there some reason that anything in this packet must be considered an id? Can you add non-id data to the packet?
Jan 24, 2017 at 17:20 history edited Tulains Córdova CC BY-SA 3.0
edited body
Jan 24, 2017 at 16:41 comment added 9000 How do you determine if a packet is noise? If you can do it locally, it seems a good idea to filter out noise without touching a DB.
Jan 24, 2017 at 2:06 comment added Paul can you tell us a little more about how the Ids are assigned, where, and what the threat profile for hacking is?
Jan 24, 2017 at 1:53 comment added Robert Harvey Well, I saw your edit. I'd say that, if the technique that you propose meets your stated goals without compromising security or causing other problems, then it's the "right" thing to do.
Jan 24, 2017 at 1:51 history edited Robert Harvey CC BY-SA 3.0
deleted 2 characters in body
Jan 24, 2017 at 1:36 answer added Slawek timeline score: 0
Jan 24, 2017 at 0:38 history edited Logister CC BY-SA 3.0
added 540 characters in body
Jan 24, 2017 at 0:04 answer added John Wu timeline score: 2
Jan 23, 2017 at 23:42 answer added Sam timeline score: 1
Jan 23, 2017 at 23:28 comment added Robert Harvey Can you clarify the phrase "verify that the received IDs match internal data"? Also, what does "minimize processing" mean? Are you having performance problems that are directly impacting the application's ability to perform its job? More specifically, what use case/user story is achieved or improved by implementing your proposed modification, and how?
Jan 23, 2017 at 23:25 history asked Logister CC BY-SA 3.0