VerifyVaultverifyvault.hashnode.dev·Jul 25, 2024Unveiling the Shield: The Truth About End-to-End EncryptionIn an era where digital privacy is more valuable than ever, understanding end-to-end encryption (E2EE) can empower you to safeguard your personal information effectively. Imagine a digital lock that only you and your intended recipient possess the ke...Discuss·1 like2FA
Crypt(iq)iqmacodes.hashnode.dev·Jul 21, 2024The Role of Encryption in CybersecurityA lot of things happen when we share stuff online, whether we're communicating on social media, making transactions, uploading and storing files on the cloud, or simply connecting to a Wi-Fi network. In all of these scenarios data is used and exchang...Discuss·5 likes·45 readsencryption
Gaurav Vishwakarmablogs.gauravvishwakarma.com·Jul 21, 2024Unveiling the Mysteries: Public Key, Private Key, and Address in the Ethereum RealmThe world of Ethereum and blockchain technology is both fascinating and complex, filled with unique cryptographic components that work in harmony to secure and manage digital assets. Among these components, three fundamental elements stand out: the p...DiscussEthereum
Ahmad W Khanblog.ahmadwkhan.com·Jul 19, 2024Understanding End-to-End EncryptionIn an era where digital communication has become integral to our daily lives, the need for secure and private messaging has never been more critical. End-to-end encryption (E2EE) stands as a formidable guardian of privacy, ensuring that only the inte...Discuss·1 likeE2E
SKsk4clouddevops.hashnode.dev·Jul 15, 2024Understanding HTTP, HTTPS, SSL & TLS1. HTTP (Hypertext Transfer Protocol) What it is: HTTP is the foundational protocol used for transferring data on the web. Purpose: It allows browsers to communicate with web servers to fetch and display web pages. How it works: When you enter a URL ...DiscussSSL
Md. Sadiqmdsadiqmd.hashnode.dev·Jul 14, 2024Cryptography and Digital SignaturesIntroduction On the Internet, we try to send data between two nodes, users, or machines, but there is always an underlying threat of information or data leaks, generally termed as Man-in-the-Middle attack. Thus, cryptography comes into the picture. E...Discuss·1 like·26 readsdigital-signature
VerifyVaultverifyvault.hashnode.dev·Jul 11, 2024Unlocking the Power of Encryption: Safeguard Your Digital World TodayIn today's digital age, where information is both a powerful asset and a potential vulnerability, the need for robust data protection has never been more critical. Whether you're sharing sensitive business data, communicating personal information, or...Discuss2FA
Huzaifa Vakilhuzaifavakil.hashnode.dev·Jul 9, 2024Hashing & Digital SignatureIn the previous short blog, we covered the basics of encryption. In this article, let's take it a step further and talk about hashing and digital signatures. First question that arises is why do we even need hashing or digital signatures ?Let us cons...Discussencryption
Mukesh Kumarmkstech.hashnode.dev·Jul 9, 2024GPG Encryption/Decryption Quick GuideTo list the existing GPG keys: gpg --list-secret-keys --keyid-format=long gpg --list-signatures gpg -k --keyid-format long To generate gpg keys(Will ask for pass phrase), these commands will generate the pair of keys i.e. public and private keys wit...Discusspublic gpg key
Abel Misiochaabelmisiocha.hashnode.dev·Jul 9, 2024Two way encryption in GoLangSometimes you need to store sensitive data that cannot be stored as plain text in your database. When the data stored needs to be used in its original plain text format, we then need a way to decrypt it. Unlike bcrypt, which is one-way, we need a way...Discussencryption