Cryptography for developers
dev.to·2d·
Discuss: DEV
🔒TLS/SSL
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.com·1d
🎯Penetration Testing
Flag this post
PQC in plaintext: How we're helping customers prepare for a quantum-safe future
cloud.google.com·2d
🔒TLS/SSL
Flag this post
De Bruijn Numerals
text.marvinborner.de·2d·
Discuss: Hacker News
💻Computer Science
Flag this post
A DRL-Empowered Multi-Level Jamming Approach for Secure Semantic Communication
arxiv.org·1d
🔐Cybersecurity
Flag this post
The cryptography behind electronic passports
blog.trailofbits.com·1d·
Discuss: Hacker News
🔒TLS/SSL
Flag this post
The internet was made for privacy
doctorow.medium.com·1d
🔐Cybersecurity
Flag this post
Secure Onion Encryption and the Case of Counter Galois Onion
eprint.iacr.org·2d
🔒TLS/SSL
Flag this post
Directory Traversal Attacks
dev.to·12h·
Discuss: DEV
💉SQL Injection
Flag this post
Building a Privacy-First Log Analyzer for Banking QA: The Technical Architecture
dev.to·2h·
Discuss: DEV
🎯Penetration Testing
Flag this post
Understanding Hashing: The Backbone of Data Integrity in Cybersecurity
dev.to·1d·
Discuss: DEV
🔐Cybersecurity
Flag this post
FinWise Data Breach Exposes Insider Threats, Highlights Need for Strong Encryption and Key Management
blogger.com·1d
🔐Cybersecurity
Flag this post
Guide: TLS and QUIC
moq.dev·1d·
Discuss: Hacker News
🔒TLS/SSL
Flag this post
Policy, privacy and post-quantum: anonymous credentials for everyone
blog.cloudflare.com·2d
🔒TLS/SSL
Flag this post
Oops, My UUIDs Collided
alexsci.com·1d·
Discuss: Hacker News
🔐Cybersecurity
Flag this post
Quantum-Resistant Federated Learning: Securing Distributed Model Training Against Post-Quantum Cryptography Threats
dev.to·10h·
Discuss: DEV
🧱Firewalls
Flag this post
North Korean hackers seen using blockchain to hide crypto-stealing malware
therecord.media·1d·
Discuss: Hacker News
🔐Cybersecurity
Flag this post
Signal’s Post-Quantum Cryptographic Implementation
schneier.com·3d·
Discuss: Hacker News
🔒TLS/SSL
Flag this post
Avoid These 5 PC Building Mistakes
howtogeek.com·15h
🔬Reverse Engineering
Flag this post
I just learned what “post-quantum VPN” actually means and the future looks scary
makeuseof.com·1d
🔐Cybersecurity
Flag this post