Canopascanopas.hashnode.dev·an hour agoConsistent Data Encryption in Android, iOS, and Flutter Apps with AESBackground In today’s digital world, ensuring data security is paramount. We entrust our devices with sensitive information, and protecting that data is crucial for us. Maintaining consistent security practices can be challenging when developing apps...DiscussFlutter
Andreas RenzforEncryptoriumblog.encryptorium.com·Mar 27, 2024Public Key Infrastructure (PKI): An essential part of today's internetIn an era where digital security is more critical than ever, understanding the mechanisms that keep our online interactions secure is vital. One of the cornerstone technologies ensuring the confidentiality, integrity, and authentication (CIA) of digi...Discusspublic key infrastructure
SANKALP HARITASHsankalp-haritash.hashnode.dev·Mar 25, 2024Securing the Digital Realm: A Dive into Encryption Algorithms and the Magic of SSL/TLSIn the vast expanse of the digital universe, data security emerges as a paramount concern, akin to safeguarding treasures in the ancient world. Encryption, the art of encoding messages, stands as the guardian of this realm, ensuring that prying eyes ...Discussencryption
Mohamed Ismail Sihssmaheel.hashnode.dev·Mar 16, 2024Shielding Your Data: AES-GCM Encryption & Decryption for JavaScript, TypeScript, Java, and Python 🛡️🔐Hey There, 👋 Awesome Developers! 🚀 Today, let's explore the AES-GCM encryption and decryption with code examples in JS, TS, Java and Python. If you're eager to enhance your data protection skills! 👇 Let's get started! Introduction 🚀 Ever felt wor...DiscussJavaScript
Krishna Koltekrishnadk.hashnode.dev·Mar 12, 2024Kocher's Timing AttackIn part 2 of the Cryptanalysis and Side-Channel Attack Series, we will perform a simulated attack on the famous RSA encryption algorithm. Even though the real-time and the simulated attacks differ greatly, the simulated attack will give us a deeper u...Discuss·10 likesCryptanalysis and Side-Channel AttacksCryptography
Priya Mervanasslinsights.hashnode.dev·Mar 9, 2024Understanding Port 443: What It Is and Why It Matters for Web SecurityIn the vast expanse of the internet, where data flows like a digital river, security is paramount. One crucial aspect of this security lies in the realm of ports, those virtual gateways that facilitate communication between your computer and servers ...DiscussSecurity
Aaron Jevil Nazarethaarons-space.hashnode.dev·Mar 6, 2024JSON Web Token(JWT)Introduction Json web tokens is the method using which information can be shared between 2 parties in a secure way. It allows you to decode, verify and generate JWT. What is Authentication? Authentication is the method of proving if something is genu...Discuss·11 likesJSON Web Tokens (JWT)
Priya Mervanasslinsights.hashnode.dev·Mar 1, 2024Intermediate Certificates 101: Understanding the Building Blocks of SSL/TLS EncryptionIn the complex world of SSL/TLS encryption, understanding the role of intermediate certificates is like unlocking the secret to secure online communication. These lesser-known building blocks play a critical role in establishing trust and ensuring da...DiscussDeveloper
Akash Kumarakaashvaa.hashnode.dev·Feb 28, 2024Are you exposing your localStorage data ?prerequisite : Reactjs and zustand here we will see how we can decrypt our localStorage data in the zustand. Zustand : It's state management library like redux or RTK. first let see how our normal global state look like. consider it as a simple todo...Discuss·1 likeReact
Shahi ShreshthforTechLearn Indiablog.techlearnindia.com·Feb 25, 2024Demystifying Cloud Security: A Journey from Vulnerability to ResilienceThe cloud has revolutionized how businesses operate, offering scalability, agility, and cost-effectiveness. However, with this evolution comes the crucial need for robust security measures. This blog will guide you through the fundamental aspects of ...DiscussCloud Computing