Backbonebackbone-dev.hashnode.dev·Jun 27, 2023Launching Backbone🚀 We've launched Backbone Secrets to the general public! We’re excited to announce Backbone — our project to build the digital equivalent of a bank vault for organizations’ sensitive data. In a world where data breaches are rampant and surveillanc...DiscussSecurity
Kelyn Njeriblog.kelynnjeri.me·Jun 8, 2023Exploring End-to-End Encryption: Methods and AlgorithmsIn today's digital landscape, where data privacy is of paramount importance, end-to-end encryption (E2EE) has emerged as a crucial technology. E2EE ensures that only the intended recipients can access and decipher encrypted data, even if intercepted ...Discuss·44 readsEnd-to-End Encryptionend-to-end-encryption
Pengblog.peng.kiwi·Mar 4, 2023Use end-to-end encryption to implement authenticationFor normal websites, when you signup, you need to send your email and plaintext password to the backend, then the backend hashes the password and saves it to DB. Google, Facebook, and Apple all do this. I implement the auth for Watcher37 and Link37 i...Discuss·37 readsauthentication
Pengblog.peng.kiwi·Mar 4, 2023One timestamp to implement "Logout from all devices"I use jwt token to protect my backend endpoints, it works this way: Users log in with username and password, and they get a refresh token (valid for 30 days) and an access token (valid for 5 min); Every time users make a request to the protected en...Discuss·78 readsJWT
Upadrasta Harshaharshaupadrasta.hashnode.dev·Feb 12, 20235 technologies for Data securityData security is an increasingly important issue in our technology-driven world. With the rise of cloud computing, the Internet of Things (IoT), and big data, the amount of sensitive information being stored and shared online has skyrocketed. This ha...Discuss·30 readsData security
Chrisblog.stophe.com·Feb 11, 2023How to securely share a file?Tl;dr: I created sharrr.com as a proof-of-concept - this service allows you to share a file up to 100GB (technically, there is no file size limit) following a zero-knowledge encryption scheme. All code is open source on GitHub. Disclaimer: I am not a...Discuss·2.2K readsCryptography