DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Recovery codes… Or just one recovery code?

Recovery codes… Or just one recovery code?

Comments
2 min read
Building a Cryptographic Flight Recorder for Algorithmic Trading: VCP v1.1 Deep Dive with Python, TypeScript, and MQL5

Building a Cryptographic Flight Recorder for Algorithmic Trading: VCP v1.1 Deep Dive with Python, TypeScript, and MQL5

1
Comments
29 min read
Build a Complete PKI from Scratch in Node.js

Build a Complete PKI from Scratch in Node.js

Comments
14 min read
Proving What AI Didn't Generate: Building Cryptographic Refusal Logs with CAP-SRP

Proving What AI Didn't Generate: Building Cryptographic Refusal Logs with CAP-SRP

1
Comments
14 min read
How We Built Multi-Modal Screen Detection for Cryptographic Evidence Capture: VeraSnap

How We Built Multi-Modal Screen Detection for Cryptographic Evidence Capture: VeraSnap

Comments
16 min read
VeraSnap Building a Cryptographic Evidence Capture App for Android with Kotlin, CameraX, and Hardware-Backed Security

VeraSnap Building a Cryptographic Evidence Capture App for Android with Kotlin, CameraX, and Hardware-Backed Security

Comments
13 min read
VCP v1.1: Building Cryptographic Audit Trails for AI Trading Systems After the 2026 Silver Crash

VCP v1.1: Building Cryptographic Audit Trails for AI Trading Systems After the 2026 Silver Crash

Comments
20 min read
Building Tamper-Evident Audit Trails for Trading Systems: A Complete VCP v1.1 Implementation Guide

Building Tamper-Evident Audit Trails for Trading Systems: A Complete VCP v1.1 Implementation Guide

Comments
24 min read
The First Zero-Knowledge Proof of AI Safety Judgment

The First Zero-Knowledge Proof of AI Safety Judgment

Comments
10 min read
VCP v1.1: Cryptographic Audit Trails for AI Trading Systems (EU AI Act Ready)

VCP v1.1: Cryptographic Audit Trails for AI Trading Systems (EU AI Act Ready)

1
Comments
10 min read
PGP and GPG Explained: Encrypt Files and Verify Authenticity

PGP and GPG Explained: Encrypt Files and Verify Authenticity

Comments
1 min read
A Product Page Erased $285 Billion. Here's What the Audit Trail Should Have Captured.

A Product Page Erased $285 Billion. Here's What the Audit Trail Should Have Captured.

1
Comments
8 min read
Beyond Encryption: Designing a Tamper-Evident State Engine

Beyond Encryption: Designing a Tamper-Evident State Engine

Comments
3 min read
X.509 Beyond Trust: Weaponizing Certificate Extensibility Without Breaking TLS

X.509 Beyond Trust: Weaponizing Certificate Extensibility Without Breaking TLS

Comments
2 min read
Userland Authority: How Non-Root Termux Can Mint TLS Identities and Expose Hidden Trust Gaps

Userland Authority: How Non-Root Termux Can Mint TLS Identities and Expose Hidden Trust Gaps

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.