DEV Community

# encryption

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why anti-encryption laws are crazy

Why anti-encryption laws are crazy

68
Comments 8
4 min read
✨How to Run Secure Search over Encrypted Data

✨How to Run Secure Search over Encrypted Data

12
Comments
4 min read
Java Socket based chat application with SHA-1 hash encryption

Java Socket based chat application with SHA-1 hash encryption

7
Comments 1
1 min read
Hashing your Data in Deno Using Bcrypt

Hashing your Data in Deno Using Bcrypt

3
Comments
2 min read
Understanding Hacking 101...

Understanding Hacking 101...

53
Comments 8
3 min read
Mounting a second encrypted hard drive automatically under Debian or Ubuntu

Mounting a second encrypted hard drive automatically under Debian or Ubuntu

2
Comments 1
2 min read
As ameaças à criptografia ponta-a-ponta (end-to-end encryption)

As ameaças à criptografia ponta-a-ponta (end-to-end encryption)

2
Comments
3 min read
Generating Random Password in Python - Practical Guide

Generating Random Password in Python - Practical Guide

24
Comments 6
7 min read
Will Banning Cryptography Keep the Country Safe?

Will Banning Cryptography Keep the Country Safe?

12
Comments
3 min read
Secure Ninja Forms in Wordpress

Secure Ninja Forms in Wordpress

7
Comments
7 min read
#Hash Vs Encryption?

#Hash Vs Encryption?

14
Comments 1
3 min read
PGP Subkeys for Keybase

PGP Subkeys for Keybase

3
Comments
3 min read
Where to use encryption 🤔

Where to use encryption 🤔

8
Comments 2
1 min read
Use strong encryption and hashing algorithms in Java

Use strong encryption and hashing algorithms in Java

15
Comments 3
2 min read
KeePass: SSH keys passwords storage and decryption on Linux

KeePass: SSH keys passwords storage and decryption on Linux

18
Comments
4 min read
What is: Linux keyring, gnome-keyring, Secret Service, and D-Bus

What is: Linux keyring, gnome-keyring, Secret Service, and D-Bus

20
Comments 1
22 min read
Signing Your Work as a Developer

Signing Your Work as a Developer

6
Comments
4 min read
Encrypted Contact Form in Vue

Encrypted Contact Form in Vue

8
Comments 2
5 min read
How Facebook Avoids Ad Blockers

How Facebook Avoids Ad Blockers

12
Comments
3 min read
How to Share Google Docs Securely with a Google Apps Script

How to Share Google Docs Securely with a Google Apps Script

9
Comments 1
9 min read
How to encrypt a string in Java using RSA and decrypt it in Python

How to encrypt a string in Java using RSA and decrypt it in Python

9
Comments
2 min read
Securely sending Emails from static sites with a 3rd party API

Securely sending Emails from static sites with a 3rd party API

7
Comments
5 min read
Introducing Certera

Introducing Certera

8
Comments
4 min read
Hide Your Keys Hide Your Wife!

Hide Your Keys Hide Your Wife!

12
Comments
5 min read
Building HIPAA Compliant End-to-End Encrypted Chat with Stream React Chat and Virgil Security

Building HIPAA Compliant End-to-End Encrypted Chat with Stream React Chat and Virgil Security

36
Comments 1
9 min read
Initramfs: Dropping to a Shell

Initramfs: Dropping to a Shell

11
Comments 1
4 min read
Today I Was Confused — AES/CBC/PKCS5PADDING

Today I Was Confused — AES/CBC/PKCS5PADDING

6
Comments
3 min read
We created FileKit - The end-to-end encrypted file transfer toolkit for Javascript

We created FileKit - The end-to-end encrypted file transfer toolkit for Javascript

6
Comments
3 min read
How To Encrypt Multiple Files With Travis CI

How To Encrypt Multiple Files With Travis CI

11
Comments
3 min read
(Very) Basic Intro to the Scrypt Hash

(Very) Basic Intro to the Scrypt Hash

7
Comments
3 min read
Encryption and Decryption with Python Azure Functions

Encryption and Decryption with Python Azure Functions

8
Comments
6 min read
Resize LVM on LUKS partition without messing everything up

Resize LVM on LUKS partition without messing everything up

6
Comments
4 min read
Decrypting boot drives remotely using dropbear

Decrypting boot drives remotely using dropbear

5
Comments
3 min read
Encryption with a Funky Partition Layout

Encryption with a Funky Partition Layout

10
Comments
3 min read
libVES: End-to-End Encryption API. Encrypt Everything without fear of losing the Key

libVES: End-to-End Encryption API. Encrypt Everything without fear of losing the Key

11
Comments
1 min read
How to Securely Store a Password in Java

How to Securely Store a Password in Java

117
Comments 21
11 min read
Policy-Based Client-Side Encryption in Angular

Policy-Based Client-Side Encryption in Angular

18
Comments 3
12 min read
Storing confidential data in the cloud securely with Cryptomator

Storing confidential data in the cloud securely with Cryptomator

87
Comments 3
6 min read
How does Diffie-Hellman work?

How does Diffie-Hellman work?

8
Comments
1 min read
Secure communication program in a workplace. The end of the Skype era

Secure communication program in a workplace. The end of the Skype era

12
Comments
1 min read
Encrypting Files in a Post-PGP Age

Encrypting Files in a Post-PGP Age

24
Comments 3
5 min read
Simple String encryption in Rails

Simple String encryption in Rails

40
Comments 4
4 min read
Simple and secure email sending

Simple and secure email sending

13
Comments
3 min read
How to setup Full Disk Encryption on a secondary HDD in Linux

How to setup Full Disk Encryption on a secondary HDD in Linux

27
Comments 10
6 min read
Software security is hopelessly broken

Software security is hopelessly broken

29
Comments 8
8 min read
How to securely store API keys

How to securely store API keys

207
Comments 28
5 min read
Using end2end encryption for ensuring mobile app security and data privacy

Using end2end encryption for ensuring mobile app security and data privacy

8
Comments 2
2 min read
Random vs. Pseudorandom

Random vs. Pseudorandom

41
Comments 2
9 min read
What is Encryption?

What is Encryption?

22
Comments 7
5 min read
"Using the Vigenère Cipher to Encrypt a Message with Javascript"

"Using the Vigenère Cipher to Encrypt a Message with Javascript"

14
Comments 7
5 min read
Oracle TDE

Oracle TDE

4
Comments
1 min read
Encrypt Data With Asymmetric AWS KMS in 5 minutes or less

Encrypt Data With Asymmetric AWS KMS in 5 minutes or less

9
Comments
4 min read
Secrypto

Secrypto

12
Comments
1 min read
Auto-mounting encrypted drives with a remote key on Linux

Auto-mounting encrypted drives with a remote key on Linux

6
Comments
8 min read
The risk of unprotected private keys (orbjet.org)

The risk of unprotected private keys (orbjet.org)

4
Comments
1 min read
What personal privacy/security measures do you take?

What personal privacy/security measures do you take?

5
Comments 37
1 min read
Encrypted Alternative to Google Photo

Encrypted Alternative to Google Photo

6
Comments
2 min read
Is it still safe for large production applications with a large user base to use bcrypt as the password hashing algorithm ?

Is it still safe for large production applications with a large user base to use bcrypt as the password hashing algorithm ?

8
Comments 3
1 min read
Dual Encryption

Dual Encryption

3
Comments
2 min read
How to capture code snippets on the web and store them securely with just one click?

How to capture code snippets on the web and store them securely with just one click?

4
Comments
1 min read
loading...