Questions tagged [tags]
For questions about tagging questions, creating and deleting tags and tag synonyms.
118 questions
3
votes
1
answer
36
views
Is it worth making a tag for [reproducible-builds]?
A search for "reproducible build" turns up 61 posts. Even if we discount some of the posts as questions and answers in the same thread, I think a reproducible-builds tag would be in the top ...
1
vote
0
answers
257
views
Tag for "group chat" encryption and group key exchange protocols
I'm proposing a new tag to cover the more specific key exchange and encryption amongst groups.
I'm thinking along the lines of group-chat : an argument for this choice is that the concept would be ...
2
votes
0
answers
165
views
Can we make the 2fa tag a synonym of multi-factor?
I've been trying to kill the 2fa tag for a while, but it keeps comming back from the dead. We already have the tag multi-factor and I see no meaningful distinction that would be upheld by people ...
4
votes
0
answers
145
views
What to do about the password tag mess?
Our tagging landscape for all things password-related is a bit of a mess. Right now, there are:
passwords (3.8k): Specific to the security of passwords: hashing, entropy, cracking, resets, lockouts, ...
10
votes
0
answers
99
views
Should we deprecate [technology]?
I believe it's pretty self-evident that technology is rather generic at best. The tag currently has four questions, none of them pretty good. Let's have a look at the four burnination questions:
1. ...
8
votes
2
answers
97
views
Should LibreSSL have a tag?
There is no tag for LibreSSL, and I've now encountered several Qs that are tagged openssl but are actually about Libre. Searching "libressl" finds 55 Qs while "libressl [openssl]" ...
9
votes
1
answer
97
views
What should we do about all the data destruction and recovery tags?
There are a lot of tags that seem fairly redundant. There are a number of posts (example) discussing data remanence and recovery which seem to be used more or less interchangeably:
data-recovery
data-...
5
votes
1
answer
105
views
What's your angle on [Angular]?
The name "Angular" is used to refer to Angular 2.0 and upwards, while the name "AngularJS" refers to the old 1.x version.
We have had angularjs for some time, it has 32 questions. ...
8
votes
1
answer
119
views
Can we exclude some inclusion tags?
We have the following three tags:
file-inclusion, 36 questions:
A remote code execution attack where user input is used to build the path of code files to be executed, allowing an attacker to ...
3
votes
2
answers
260
views
Rewording "Whitelist" and "Blacklist" tags
Given the recent move away from the loaded meanings of "white" and "black", and that organisations are moving away from the terms "whitelist" and "blacklist", ...
11
votes
2
answers
144
views
What is the point of company-specific tags and should we burninate them?
I recently saw that microsoft exists, and has 79 questions tagged as of this writing. Upon checking, apple, amazon and facebook exist as well.
Facebook I can explain, since the company and the main ...
6
votes
1
answer
79
views
Do we need the [bypass] tag?
A few days ago, the tag bypass was created. Is this a tag we actually need or can I kill it?
My philosophy on tags is that they need to be at least a little specific. Every security question is in ...
13
votes
1
answer
305
views
The ununiqueness of UUID and GUID
I recently created the tag uuid because I thought it was missing. Then I discovered the guid tag. How to deal with these two?
They are sort of the same thing (at least they have the same Wikipedia ...
1
vote
1
answer
36
views
Can we deconfigure the [configuration] tag?
Currently, 137 questions are tagged configuration. No tag wiki, no usage guidance.
The tag sort of begs the question - configuration of what? I think these questions ought to be tagged with that ...
3
votes
1
answer
71
views
Why there is not a PRNG or CSPRNG tag?
I just came across this question: Is getting 1-2 outputs from a CSPRNG to seed another CSPRNG less entropy than getting say 5000 outputs from a CSPRNG and using that to seed?
I noticed that we do not ...
-6
votes
1
answer
111
views
Obsolete [blackberry] tag → 🗑️
I would like to say that the blackberry is highly obsolete and pretty much dead, nobody longer use such smartphones.
3
votes
1
answer
38
views
How to handle very niche tags?
If i come a cross a post that have a very niche, and probably new, but still relevant tag, how should I handle it? I mean for situation where we cant reasonably expect lots of questions in that ...
1
vote
1
answer
77
views
What does the "donut" tag stand for?
I once, not long ago saw the tag donut, floating on the right on my screen in the tags. What is that supposed to be?
8
votes
0
answers
59
views
Request to rename [macosx] → [macos]
The current name of Apple's desktop operating system is macOS. On this site, the tag macosx is used to refer to that ("Mac OS X" was the original name of the operating system").
But other Stack ...
5
votes
0
answers
86
views
An edit shows a tag was both removed and added
In this edit of mine last January, it shows that the tag [dns-domain] was both removed and added.
Is this a bug?
2
votes
1
answer
46
views
Is there an "analog" type of tag?
I just asked a question regarding old fashioned paper, ink and handwriting.
I notice that there are many other questions on the site concerning "analog" information security, such as involving ...
1
vote
1
answer
58
views
What is the proper way to format a question asking for improvements for a security scenarios?
I asked a question on stack exchange meta recently for recommending a site for my question and they suggested Information security.
Question link: Where to ask about improvements for a security ...
10
votes
1
answer
118
views
Ambiguous [image] tag
The image tag is currently used for:
the picture kind of images
forensic images
to 'image' a computer in the sense of writing a disk image to it
And I'm surprised nobody referred to iso(-like) files ...
3
votes
0
answers
54
views
Is there a tag for infoleaks?
I know there is a data-leakage tag, but that is not what I am looking for. I am wondering if there are any tags that encompass traditional information leakage in binary exploitation, for example ...
7
votes
0
answers
122
views
New tag suggestion - OSINT
I find it curious that there aren't any tags for open source intelligence (OSINT) or even threat intelligence (TI). There do seem to be multiple questions that could make use of an OSINT tag, ...
1
vote
1
answer
57
views
Should we have a canonical question tag?
I posted a canonical question and was wondering why there wasn't a tag for canonical questions?
Shouldn't we have a tag for this? Right now the only way to know for sure that the question is intended ...
6
votes
2
answers
173
views
What to do about the [fingerprint] tags?
We have a number of different concepts related to "fingerprints" on this site:
Physical fingerprints, e.g. for use in biometric authentication.
Fingerprinting software (and hardware?), i.e. trying to ...
18
votes
1
answer
226
views
Spam, spam, [spammer] and [spam]
We currently have two tags for spam:
spam, 316 questions
spammer, 17 question
While I understand the difference between the person who sends the spam and the spam itself, that is not a meaningful ...
4
votes
1
answer
75
views
Merge [polp] and [least-privilege]?
These two tags looks like duplicates to me:
least-privilege: 3 questions, no wiki
polp: 1 question, good wiki
I think the general rule is to avoid abbreviations in tag names unless they are more ...
5
votes
2
answers
89
views
Limit the [owasp] and [owasp-top-ten] tags?
We have the following two tags:
owasp, 142 questions
owasp-top-ten, 57 questions
Questions tagged with one or both of these falls in a number of categories:
They are about OWASP products, e.g. Zap.
...
11
votes
1
answer
206
views
Are [ssl-interception] and [tls-intercept] the same thing?
The following tags looks like duplicates to me:
ssl-interception (62 questions)
SSL Interception is a technique that can be used to intercept SSL sessions in order to inspect the encrypted traffic....
3
votes
1
answer
36
views
Tags inquiry : [tag:known-vulnerabilities] and [tag:vulnerability]
I was wondering if there was a reason to keep
known-vulnerabilities and vulnerability distinct.
known-vulnerabilities
A vulnerability which is known to the designers, implementers, or operators ...
2
votes
1
answer
81
views
Rename [csrf] → [cross-site-request-forgery]
I would like to propose renaming the csrf tag to cross-site-request-forgery.
a cross site request forgery attack causes a visitor of a malicious website to send a request to a legit website to ...
-3
votes
3
answers
130
views
New tag request: Insecurity-Questions and Security-Questions
I propose that we have new tags for insecurity-questions with a synonym of security-questions to be used for questions about those annoying favorite-pet or mother-maiden-name kind of questions that ...
1
vote
1
answer
43
views
Is [evil-twin] an evil twin of [rogue-ap]?
I suspect these two tags might be duplicates?
rogue-ap: Three questions, all about "fake" copies of Wi-Fi access points.
evil-twin: Seven questions, all about "fake" copies of Wi-Fi access points (...
1
vote
1
answer
70
views
We may all be paranoid - but for real reasons, not [advanced-delusionary-schizophrenia]
As a (not bad) joke, the following tags were added to the now deleted question at https://security.stackexchange.com/questions/172515/traffic-being-routed-to-uk-ministry-of-defense
advanced-...
16
votes
2
answers
206
views
Can we kill the [data-security] tag?
There is a data-security tag, with five questions:
Data Security includes protecting data from unauthorized disclosure plus protecting the integrity of the data so it cannot be lost or altered ...
11
votes
1
answer
110
views
What to do about [tag:nfc] and [tag:near-field-communication]?
Currently we have two tags for NFC:
nfc, 44 questions and no excerpt
near-field-communication, 27 questions and this excerpt:
NFC is a short-range wireless technology, typically requiring a ...
7
votes
2
answers
98
views
Can we authoritatively merge [certificates] and [x.509]?
We have a tag certificates and a pair of tags x509 and x.509. The latter two should obviously be synonyms. What about certificates?
In theory X.509 could be about side topics such as CSR or CRL, but ...
3
votes
0
answers
35
views
Marry tags iso27000 and iso27001 - and possible future tags iso27002-27k-n - to iso2700x tag
Let's don't have a tag for every other ISO 27k standard. They are so much in the same ballpark topic-wise, that they deserve to be under the same tag.
EDIT:
I did a quick search on all questions ...
10
votes
5
answers
256
views
What's the point of tags?
Yup, I mean exactly that: what purpose do tags serve?
As a high-rep user, I spend a fair amount of time editing tags on questions, and I've recently started working towards the Research Assistant ...
-1
votes
2
answers
92
views
"Where does this hash comes from" / Member since today
So, I'm pretty sure we all have been trough one of most typical questions
"Where does this hash comes from?" & Member since today
Why is there so much interest in this? Can we have a tag called ...
10
votes
2
answers
140
views
Do we need both a smartphone tag and a phone tag?
Do we need both a smartphone tag and a phone tag, and also a mobile tag and a cellular tag?
6
votes
1
answer
109
views
Rename [safe-browsing] to [google-safe-browsing]?
The tag safe-browsing has the following excerpt:
Safe Browsing is a service provided by Google that enables applications to check URLs against Google's constantly updated lists of suspected ...
9
votes
2
answers
128
views
Do we do meta tags like [homework]?
Recently the tag homework was introduced on this question, with the following usage guidance:
A question identified as a homework assignment.
This sounds very much like a meta tag to me - it is ...
13
votes
1
answer
317
views
Establish [bug-bounty] tag?
I noticed there is no tag for bug bounty programs. Does it make sense to establish a tag like [bug-bounty] that covers questions about vulnerability reward programs (like the one Google runs) and bug ...
7
votes
0
answers
117
views
How should the [penetration-test] tag be used?
I see a lot of questions tagged with penetration-test that in my opinion has nothing to do with pen testing other than that the OP came up with the quesiton while doing a pen test.
Some random ...
19
votes
0
answers
162
views
Merging [burp] and [burpsuite]?
Aren't these two tags actually the same thing?
burp, 57 questions, 9 followers:
a popular platform for performing security testing of web applications. It can also be used by a malicious party to ...
11
votes
1
answer
126
views
Burninate [token]?
We had some great sucess with eliminating the pointless tag file recently. I would like to continue the quest to rid the world of bad tags by proposing a new candidate for burnination: token. It is ...
16
votes
1
answer
161
views
Time to file [file] for burnination?
We have a tag named file, 30 questions, 1 follower, no tag wiki. I think the tag should be burninated (i.e. deleted), since it serves no purpose. It is both broad and vague at the same time. Aren't ...