Lawrence Juma "Jumalaw98"jumalaw98.hashnode.dev·Oct 21, 2024Day 22: Keeping Your Secrets SafeImagine sharing a private message with a friend, only to discover that others can see it, too. It's not so private anymore, right? Today's topic concerns secure messaging apps—apps designed to protect your messages from prying eyes. Whether you're a ...DiscussCybersecurity Awareness 2024: Securing Our WorldSecure messaging
Amos Gyamfiamosgyamfi.hashnode.dev·Aug 7, 2024Secure Data and Safeguard Users an App With End-to-End EncryptionHave you ever wondered about the cost and wreaking havoc data breaches cause worldwide every year? Let’s look at how end-to-end encryption eliminates this concern. In securing web and mobile applications, developers generally use traditional methods ...Discussencryption
Ahmad W Khanblog.ahmadwkhan.com·Jul 19, 2024Understanding End-to-End EncryptionIn an era where digital communication has become integral to our daily lives, the need for secure and private messaging has never been more critical. End-to-end encryption (E2EE) stands as a formidable guardian of privacy, ensuring that only the inte...Discuss·1 likeE2E
Christopher Wilsontechshopper.hashnode.dev·Jul 3, 2024Security Protocols in Social Networks: What Every User Needs to KnowSocial networks have become integral to modern communication, connecting billions of people worldwide. While these platforms offer unprecedented connectivity and convenience, they also present significant security challenges. Understanding the securi...Discusssecurity protocols
Backbonebackbone-dev.hashnode.dev·Jun 27, 2023Launching Backbone🚀 We've launched Backbone Secrets to the general public! We’re excited to announce Backbone — our project to build the digital equivalent of a bank vault for organizations’ sensitive data. In a world where data breaches are rampant and surveillanc...DiscussSecurity
Kelyn Njeriblog.kelynnjeri.me·Jun 8, 2023Exploring End-to-End Encryption: Methods and AlgorithmsIn today's digital landscape, where data privacy is of paramount importance, end-to-end encryption (E2EE) has emerged as a crucial technology. E2EE ensures that only the intended recipients can access and decipher encrypted data, even if intercepted ...Discuss·796 readsEnd-to-End Encryptionend-to-end-encryption
Pengblog.peng.kiwi·Mar 4, 2023Use end-to-end encryption to implement authenticationFor normal websites, when you signup, you need to send your email and plaintext password to the backend, then the backend hashes the password and saves it to DB. Google, Facebook, and Apple all do this. I implement the auth for Watcher37 and Link37 i...Discussauthentication
Pengblog.peng.kiwi·Mar 4, 2023One timestamp to implement "Logout from all devices"I use jwt token to protect my backend endpoints, it works this way: Users log in with username and password, and they get a refresh token (valid for 30 days) and an access token (valid for 5 min); Every time users make a request to the protected en...Discuss·213 readsJWT
Upadrasta Harshaharshaupadrasta.hashnode.dev·Feb 12, 20235 technologies for Data securityData security is an increasingly important issue in our technology-driven world. With the rise of cloud computing, the Internet of Things (IoT), and big data, the amount of sensitive information being stored and shared online has skyrocketed. This ha...Discuss·35 readsData security
Chrisblog.stophe.com·Feb 11, 2023How to securely share a file?Tl;dr: I created sharrr.com as a proof-of-concept - this service allows you to share a file up to 100GB (technically, there is no file size limit) following a zero-knowledge encryption scheme. All code is open source on GitHub. Disclaimer: I am not a...Discuss·2.6K readsCryptography