DEV Community

0 seconds of 2 minutes, 31 secondsVolume 90%
Press shift question mark to access a list of keyboard shortcuts
00:00
00:00
02:31
 
Cossack Labs
Cossack Labs

Posted on • Edited on

4 2

Complicated encryption ways explained in 2 min, by @vixentael

Data at rest encryption, TLS, application-level encryption–different encryption ways protect from different threats.

Application-level encryption is closely related with data flow and can drive you to the engineering decisions of various complexity.

For example, take a look at client-side field-level encryption in MongoDB or proxy-side transparent field-level encryption in database protection suite Acra.

In this video, Anastasiia Voitova aka @vixentael, Head of customer solutions at Cossack Labs, explains how different encryption ways work and how you can make your app more reliable and resilient to various threat models.


Reply to @vixentael and follow @Cossack Labs on Twitter.
Watch the full video on YouTube.
Get through the slides here.🐬

Reinvent your career. Join DEV.

It takes one minute and is worth it for your career.

Get started

Top comments (0)

👋 Kindness is contagious

Dive into an ocean of knowledge with this thought-provoking post, revered deeply within the supportive DEV Community. Developers of all levels are welcome to join and enhance our collective intelligence.

Saying a simple "thank you" can brighten someone's day. Share your gratitude in the comments below!

On DEV, sharing ideas eases our path and fortifies our community connections. Found this helpful? Sending a quick thanks to the author can be profoundly valued.

Okay