4d ago · 8 min read · Before I started building auth into my own projects, I didn't think too deeply about what was happening to passwords behind the scenes. Like most developers, I installed a library, called a hash funct
Join discussion
Mar 9 · 11 min read · TL;DR Nation states are harvesting encrypted data at scale RIGHT NOW. They know quantum computers will break current encryption (RSA, ECDSA) in 5-10 years. Their strategy: steal encrypted communications, classified documents, medical records, and fin...
Join discussion