Tagged | encryption
-
Enforcing encryption at scale
(research.fb.com) -
Enforcing encryption at scale
(engineering.fb.com) -
Doing AES/GCM in Android: adventures in the field
(levelup.gitconnected.com) -
Speeding up Linux disk encryption
(blog.cloudflare.com) -
Data Encryption on Android with Jetpack Security
(android-developers.googleblog.com) -
A Very Basic Introduction to AES-256 Cipher
(hackernoon.com) -
BLAKE3 Is an Extremely Fast, Parallel, Cryptographic Hash
(www.infoq.com) -
Finding Evil on the Network Using JA3/S and HASSH
(engineering.salesforce.com) -
MySQL Encryption: Talking About Keyrings
(www.percona.com) -
Introducing Nebula, the open source global overlay network from Slack
(slack.engineering) -
Privacy Power-Up: Upgrading Pin Links from HTTP to HTTPS
(medium.com) -
Announcing cfnts: Cloudflare's implementation of NTS in Rust
(blog.cloudflare.com) -
DNS Encryption Explained
(blog.cloudflare.com) -
The TLS Post-Quantum Experiment
(blog.cloudflare.com) -
Presentation: Maintaining the Go Crypto Libraries
(www.infoq.com)#software-engineering #security #practices #GoLang #encryption
-
Public keys are not enough for SSH security
(blog.cloudflare.com) -
Zero Trust at GitLab: Where do we go from here?
(about.gitlab.com) -
Zero Trust at GitLab: Implementation challenges (and a few solutions)
(about.gitlab.com) -
The Hardest Thing About Data Encryption
(developer.okta.com) -
A Tale of Two (APT) Transports
(blog.cloudflare.com) -
Introducing CIRCL: An Advanced Cryptographic Library
(blog.cloudflare.com) -
Cryptography For Software Engineers
(hackernoon.com) -
Towards Post-Quantum Cryptography in TLS
(blog.cloudflare.com)#security #systems #cryptography #encryption #quantum-computing
-
Securing Certificate Issuance using Multipath Domain Control Validation
(blog.cloudflare.com) -
Inside the Entropy
(blog.cloudflare.com) -
Building Facebook’s service encryption infrastructure
(code.fb.com) -
Shamir Secret Sharing vs Multi-sig
(hackernoon.com) -
The evolution of Zero Trust
(about.gitlab.com) -
Monsters in the Middleboxes: Introducing Two New Tools for Detecting HTTPS Interception
(blog.cloudflare.com) -
Presentation: Developer Secure Containers for the Cyberspace Battlefield
(www.infoq.com) -
Introducing Adiantum: Encryption for the Next Billion Users
(security.googleblog.com) -
Distributed PKI: Development and Use Cases
(hackernoon.com) -
TLS Fingerprinting with JA3 and JA3S
(engineering.salesforce.com) -
Presentation: Making Security Usable: Product Engineer Perspective
(www.infoq.com) -
Sharing Secrets with GPG
(8thlight.com) -
A tour through the OWASP Top 10
(auth0.com) -
Client Side Encryption in Firebase Database and Storage
(hackernoon.com) -
Scalable User Privacy
(labs.spotify.com) -
What is the math behind elliptic curve cryptography?
(hackernoon.com) -
Encrypting Different Medical Images using Deep Neural Network with Interactive Code
(towardsdatascience.com) -
What devs need to know about Encoding / Encryption / Hashing / Salting / Stretching
(hackernoon.com) -
How "expensive" is crypto anyway?
(blog.cloudflare.com) -
TLS 1.3 is going to save us all, and other reasons why IoT is still insecure
(blog.cloudflare.com) -
Revolution and Evolution: Fully Homomorphic Encryption
(galois.com) -
How RSA Works: TLS Foundations
(fly.io) -
Explain Like I’m 5: Zero Knowledge Proof (Halloween Edition)
(hackernoon.com) -
Understanding the prevalence of web traffic interception
(blog.cloudflare.com) -
A Simple, Secure Tool for One-time (Self-Destructing) Messages
(blog.algolia.com)