Jan 19 · 9 min read · Cryptography is one of the most important safeguards applied over any data. To make data unreadable for unintended people is a really complex task, since if the encryption is not complex enough, it could easily be reverse engineered back to plaintext...
Join discussion
Nov 25, 2025 · 7 min read · When you hear OTP, the first thing that comes to mind is most likely the authentication mechanism that uses a temporary, single-use code to verify a user’s identity as part of a two-factor security mechanism. However, before that was the “OG” OTP (On...
Join discussion
Aug 21, 2025 · 5 min read · As part of week#3 in Threshold Cryptography Bootcamp, we deployed our ‘randamu’ submarine and sailed deeper into the “blocklock” ecosystem. We shed light on Blocklock Encryption, a powerful tool for managing sensitive information while leveraging the...
Join discussion
Jul 27, 2025 · 2 min read · The Hackfinitiy High School became a victim of DarkInjector’s ransomware, resulting in the encryption of critical files, including academic records. Our task was to reverse-engineer the ransomware, locate its cryptographic weaknesses, and recover the...
Join discussion
May 10, 2025 · 4 min read · Introduction to ShadowCrypt ShadowCrypt is an innovative open-source application designed to make secure communication accessible to everyone. Whether you're encrypting sensitive text, decoding messages, or translating text into Morse or binary code,...
Join discussionMay 7, 2025 · 2 min read · 🚀 Shadow Crypt is launching on May 15th at 12:00 PM IST📍 Release Page: https://github.com/VeduStorm/shadow-crypt Shadow Crypt is a 100% offline tool for encrypting and decrypting passwords or messages. It uses multiple layers of logic — all built i...
Join discussionFeb 15, 2025 · 5 min read · When developing Android apps, ensuring secure data storage is essential to protect sensitive information like user credentials, tokens, and other private data from being accessed by unauthorized entities. This article covers essential techniques for ...
Join discussion
Jan 7, 2025 · 3 min read · So, you're curious about end-to-end encryption (E2EE)—who wouldn't be, right? But before diving into how E2EE works, it's essential to understand a fundamental concept: public and private keys. These keys are your unique cryptographic identity and th...
Join discussion
Nov 22, 2024 · 2 min read · OpenSSL is a robust cryptographic library that provides a wide range of algorithms for secure data encryption, hashing, and digital certificates. It supports various hash functions, including SHA-256, SHA-3, and MD5, which are commonly used to genera...
Join discussion