Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
encryption
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
đ 10 Core Concepts Every Developer Should Know About Data Security
KASRA10
KASRA10
KASRA10
Follow
Oct 15 '25
đ 10 Core Concepts Every Developer Should Know About Data Security
#
cybersecurity
#
encryption
#
digitalsignatures
#
websecurity
2
 reactions
Comments
Add Comment
3 min read
Unlocking AI's Potential: Secure Language Models for Sensitive Data
Arvind Sundara Rajan
Arvind Sundara Rajan
Arvind Sundara Rajan
Follow
Sep 11 '25
Unlocking AI's Potential: Secure Language Models for Sensitive Data
#
ai
#
machinelearning
#
privacy
#
encryption
5
 reactions
Comments
Add Comment
2 min read
The #1 Mistake Developers Make with Payment Data â and How to Fix It
Vaibhav Shakya
Vaibhav Shakya
Vaibhav Shakya
Follow
Oct 14 '25
The #1 Mistake Developers Make with Payment Data â and How to Fix It
#
android
#
security
#
encryption
#
fintech
Comments
Add Comment
1 min read
Signing and Encryption With JWS and JWE
İbrahim Gßndßz
İbrahim Gßndßz
İbrahim Gßndßz
Follow
Oct 5 '25
Signing and Encryption With JWS and JWE
#
java
#
programming
#
security
#
encryption
3
 reactions
Comments
Add Comment
7 min read
How Does Public Key Cryptography Work?
Firat
Firat
Firat
Follow
Sep 20 '25
How Does Public Key Cryptography Work?
#
cryptography
#
publickey
#
encryption
#
cybersecurity
Comments
Add Comment
3 min read
Petoron Quantum Standard (PQS)
Ivan
Ivan
Ivan
Follow
Aug 6 '25
Petoron Quantum Standard (PQS)
#
security
#
encryption
#
cryptography
#
privacy
Comments
Add Comment
1 min read
Symmetric vs Asymmetric Encryption â Lessons from the Field
Shirley Mali
Shirley Mali
Shirley Mali
Follow
Jul 28 '25
Symmetric vs Asymmetric Encryption â Lessons from the Field
#
cybersecurity
#
encryption
#
cryptography
#
beginners
Comments
Add Comment
2 min read
Cryptographic Implementation Flaws: Modern Encryption Analysis
Rafal
Rafal
Rafal
Follow
Aug 10 '25
Cryptographic Implementation Flaws: Modern Encryption Analysis
#
cybersecurity
#
cryptography
#
encryption
#
implementation
1
 reaction
Comments
Add Comment
3 min read
Implement AES-256 Encryption and Decryption in C#: A Beginner-Friendly Guide
David Au Yeung
David Au Yeung
David Au Yeung
Follow
Aug 21 '25
Implement AES-256 Encryption and Decryption in C#: A Beginner-Friendly Guide
#
aes
#
cryptography
#
encryption
#
dotnet
2
 reactions
Comments
Add Comment
3 min read
Man-in-the-Middle (MITM) Attacks: Detection and Prevention Strategies
Rafal
Rafal
Rafal
Follow
Aug 10 '25
Man-in-the-Middle (MITM) Attacks: Detection and Prevention Strategies
#
cybersecurity
#
mitm
#
network
#
encryption
1
 reaction
Comments
1
 comment
2 min read
Symmetric vs Asymmetric Encryption â Lessons from the Field
Shirley Mali
Shirley Mali
Shirley Mali
Follow
Jul 28 '25
Symmetric vs Asymmetric Encryption â Lessons from the Field
#
cybersecurity
#
encryption
#
cryptography
#
beginners
1
 reaction
Comments
Add Comment
2 min read
How to Use GPG to Encrypt Files in Termux
Stephano Kambeta
Stephano Kambeta
Stephano Kambeta
Follow
Aug 15 '25
How to Use GPG to Encrypt Files in Termux
#
gpg
#
termux
#
tutorial
#
encryption
1
 reaction
Comments
1
 comment
3 min read
Queryable Encryption With Spring Data MongoDB: How to Query Encrypted Fields
Ricardo Mello
Ricardo Mello
Ricardo Mello
Follow
for
MongoDB
Aug 6 '25
Queryable Encryption With Spring Data MongoDB: How to Query Encrypted Fields
#
java
#
mongodb
#
encryption
#
springboot
9
 reactions
Comments
Add Comment
12 min read
Why Encryption Alone Wonât Keep You Private
Secninjaz
Secninjaz
Secninjaz
Follow
Jul 25 '25
Why Encryption Alone Wonât Keep You Private
#
encryption
#
trulysecureplatform
#
metadata
#
dencentralization
Comments
Add Comment
4 min read
Offline Messaging Reinvented with Bitchat
Grenish rai
Grenish rai
Grenish rai
Follow
Jul 29 '25
Offline Messaging Reinvented with Bitchat
#
security
#
privacy
#
encryption
#
programming
8
 reactions
Comments
Add Comment
6 min read
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account