Cryptographic failures remain a big flow in mobile. But how much do programs really care?
This post is inspired by an experience I had with one Bug Bounty program. Basically, the subject app under test had a completely broken cryptography layer, which I was able to replicate in a separate Kotlin application independently of the app and de...
dispatchersdotplayground.hashnode.dev6 min read