Mar 3 · 4 min read · Last semester, I had an Information Security course, in which we went from the basics like Caesar ciphers all the way to modern algorithms like AES and SHA-256. Naturally, being a dev, I got curious a
Join discussion
Sep 19, 2025 · 4 min read · OVERVIEW Start The Instance and Download The Given Files: Let’s see the given server.py import random, hashlib, string from Crypto.Cipher import AES def kdf(pass1, pass2): return hashlib.sha256(pass1 + pass2).digest() def generate_password(le...
Join discussion
Aug 21, 2025 · 4 min read · Since a while ago I saw a lot of problems with the browsers’ system of saving passwords for you; undeniably, it's a no-brainer action for a lot of people to save their passwords directly on the browsers because it is easy to access and it's taking aw...
Join discussionMar 19, 2025 · 4 min read · Understanding the Two Giants of Encryption In modern cryptography, AES (Advanced Encryption Standard) and RSA (Rivest-Shamir-Adleman) are two of the most widely used encryption algorithms. They serve different purposes, with AES used for fast symmetr...
Join discussion
Oct 16, 2024 · 5 min read · In today's world, data security is a top priority for developers and businesses alike. One of the most widely used encryption techniques is AES (Advanced Encryption Standard), which is both fast and secure. This article will walk you through how to i...
Join discussion
Aug 4, 2024 · 3 min read · In today’s digital age, securing sensitive data in web applications is more crucial than ever. Whether you're handling user information, payment details, or confidential documents, ensuring that data is encrypted both in transit and at rest is a fund...
Join discussion
Jul 14, 2024 · 14 min read · Introduction Building a local-first app in React Native can be a rewarding yet challenging experience, especially when it comes to managing data storage efficiently. In my latest side project, I aimed to integrate Supabase as the backend while levera...
Join discussionJul 10, 2024 · 5 min read · In an era where digital threats are ever-present, the importance of securing data through advanced encryption methods cannot be overstated. From protecting personal files to safeguarding sensitive communications, understanding and implementing robust...
Join discussion