Skip to content
Navigation menu
Search
Search
Log in
Create account
DEV Community
Close
#
encryption
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Why anti-encryption laws are crazy
Paula
Paula
Paula
Follow
Jun 25 '20
Why anti-encryption laws are crazy
#
encryption
#
cipher
#
security
68
reactions
Comments
8
comments
4 min read
HTTPS , TLS, SSL, CA, Encryption & MITM attack !
Tilak Madichetti
Tilak Madichetti
Tilak Madichetti
Follow
Jan 23 '21
HTTPS , TLS, SSL, CA, Encryption & MITM attack !
#
webdev
#
tutorial
#
encryption
#
noob
55
reactions
Comments
1
comment
4 min read
Understanding Hacking 101...
Utkarsh Yadav
Utkarsh Yadav
Utkarsh Yadav
Follow
May 19 '20
Understanding Hacking 101...
#
security
#
encryption
#
javascript
#
npm
53
reactions
Comments
8
comments
3 min read
Building HIPAA Compliant End-to-End Encrypted Chat with Stream React Chat and Virgil Security
Nick Parsons
Nick Parsons
Nick Parsons
Follow
Oct 2 '19
Building HIPAA Compliant End-to-End Encrypted Chat with Stream React Chat and Virgil Security
#
encryption
#
hipaa
#
chat
#
security
36
reactions
Comments
1
comment
9 min read
What is the difference between encryption, hashing and salting?
Rodrigo Kamada
Rodrigo Kamada
Rodrigo Kamada
Follow
Feb 26 '22
What is the difference between encryption, hashing and salting?
#
encryption
#
hashing
#
salting
#
security
31
reactions
Comments
4
comments
6 min read
Bringing Your (Encryption) Keys to Multi/Hybrid Clouds
Michael Laccetti
Michael Laccetti
Michael Laccetti
Follow
Sep 8 '20
Bringing Your (Encryption) Keys to Multi/Hybrid Clouds
#
aws
#
heroku
#
vault
#
encryption
26
reactions
Comments
Add Comment
9 min read
Encrypt and Decrypt Data in Node.js using aes-256-cbc
Ugbem Job
Ugbem Job
Ugbem Job
Follow
Feb 2 '23
Encrypt and Decrypt Data in Node.js using aes-256-cbc
#
javascript
#
node
#
encryption
#
security
25
reactions
Comments
8
comments
6 min read
Generating Random Password in Python - Practical Guide
Osazuwa J. Agbonze
Osazuwa J. Agbonze
Osazuwa J. Agbonze
Follow
Mar 30 '20
Generating Random Password in Python - Practical Guide
#
python
#
password
#
security
#
encryption
22
reactions
Comments
6
comments
7 min read
Automatic Laravel Data Encryption with Eloquent
Tommy Hendrawan
Tommy Hendrawan
Tommy Hendrawan
Follow
Dec 19 '20
Automatic Laravel Data Encryption with Eloquent
#
laravel
#
php
#
encryption
#
eloquent
20
reactions
Comments
11
comments
2 min read
What is: Linux keyring, gnome-keyring, Secret Service, and D-Bus
Arseny Zinchenko
Arseny Zinchenko
Arseny Zinchenko
Follow
Dec 7 '19
What is: Linux keyring, gnome-keyring, Secret Service, and D-Bus
#
archlinux
#
linux
#
security
#
encryption
20
reactions
Comments
1
comment
22 min read
KeePass: SSH keys passwords storage and decryption on Linux
Arseny Zinchenko
Arseny Zinchenko
Arseny Zinchenko
Follow
Dec 13 '19
KeePass: SSH keys passwords storage and decryption on Linux
#
linux
#
security
#
encryption
#
ssh
18
reactions
Comments
Add Comment
4 min read
JWT Authentication with Symmetric Encryption in ASP.NET Core
Eduard Stefanescu
Eduard Stefanescu
Eduard Stefanescu
Follow
Mar 7 '21
JWT Authentication with Symmetric Encryption in ASP.NET Core
#
asp
#
dotnet
#
encryption
16
reactions
Comments
1
comment
9 min read
Stop using the environment variables for sensitive keys in Rails
Ramesh Naidu Allu
Ramesh Naidu Allu
Ramesh Naidu Allu
Follow
Jan 2 '21
Stop using the environment variables for sensitive keys in Rails
#
ruby
#
rails
#
security
#
encryption
15
reactions
Comments
Add Comment
4 min read
Use strong encryption and hashing algorithms in Java
Brian Vermeer 🧑🏼🎓🧑🏼💻
Brian Vermeer 🧑🏼🎓🧑🏼💻
Brian Vermeer 🧑🏼🎓🧑🏼💻
Follow
Dec 24 '19
Use strong encryption and hashing algorithms in Java
#
java
#
security
#
encryption
#
hashing
15
reactions
Comments
3
comments
2 min read
Creating an end-to-end encrypted chat with GetStream.io and seald.io
Sander Goossens
Sander Goossens
Sander Goossens
Follow
for
In The Pocket
Feb 23 '22
Creating an end-to-end encrypted chat with GetStream.io and seald.io
#
encryption
#
reactnative
#
security
14
reactions
Comments
Add Comment
8 min read
Implementing End to End Encryption in your Cross Platform App
Tapajyoti Bose
Tapajyoti Bose
Tapajyoti Bose
Follow
Feb 8 '21
Implementing End to End Encryption in your Cross Platform App
#
security
#
encryption
#
cryptography
#
crossplatform
14
reactions
Comments
Add Comment
5 min read
#Hash Vs Encryption?
DaNeil C
DaNeil C
DaNeil C
Follow
Jan 25 '20
#Hash Vs Encryption?
#
codenewbie
#
security
#
encryption
#
hashing
14
reactions
Comments
1
comment
3 min read
2 free data security tools every dev should know (and use)
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Mar 18 '22
2 free data security tools every dev should know (and use)
#
security
#
appsec
#
encryption
#
opensource
13
reactions
Comments
3
comments
2 min read
Encryption without passwords
Gál Péter
Gál Péter
Gál Péter
Follow
for
Wault
Jul 11 '21
Encryption without passwords
#
security
#
crypto
#
encryption
13
reactions
Comments
Add Comment
6 min read
How we implemented encryption and data masking for 60+ apps in 12 weeks
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Apr 20 '22
How we implemented encryption and data masking for 60+ apps in 12 weeks
#
security
#
encryption
#
casestudy
#
opensource
13
reactions
Comments
Add Comment
3 min read
Will Banning Cryptography Keep the Country Safe?
Lane Wagner
Lane Wagner
Lane Wagner
Follow
Feb 5 '20
Will Banning Cryptography Keep the Country Safe?
#
cryptography
#
security
#
encryption
#
endtoend
12
reactions
Comments
Add Comment
3 min read
Complicated encryption ways explained in 2 min, by @vixentael
02:31
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Apr 5 '21
Complicated encryption ways explained in 2 min, by @vixentael
#
security
#
encryption
#
appdev
#
mongodb
12
reactions
Comments
Add Comment
1 min read
Hide Your Keys Hide Your Wife!
DaNeil C
DaNeil C
DaNeil C
Follow
Oct 22 '19
Hide Your Keys Hide Your Wife!
#
codenewbie
#
security
#
encryption
#
key
12
reactions
Comments
Add Comment
5 min read
OCSP and CRL: what could go wrong?
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Jan 18 '22
OCSP and CRL: what could go wrong?
#
security
#
go
#
development
#
encryption
12
reactions
Comments
Add Comment
3 min read
How Facebook Avoids Ad Blockers
Dylan Paulus
Dylan Paulus
Dylan Paulus
Follow
Nov 24 '19
How Facebook Avoids Ad Blockers
#
encryption
#
security
#
interesting
#
ads
12
reactions
Comments
Add Comment
3 min read
Encryption & decryption for r0@drunner$
Tharun Shiv
Tharun Shiv
Tharun Shiv
Follow
Oct 24 '21
Encryption & decryption for r0@drunner$
#
cryptography
#
encryption
#
security
#
computerscience
12
reactions
Comments
Add Comment
3 min read
Encryption in ⛅ cloud native apps
Cossack Labs
Cossack Labs
Cossack Labs
Follow
May 12 '22
Encryption in ⛅ cloud native apps
#
cloudnative
#
encryption
#
cryptography
#
appsec
11
reactions
Comments
Add Comment
3 min read
How To Encrypt Multiple Files With Travis CI
Mpho Mphego
Mpho Mphego
Mpho Mphego
Follow
Jul 26 '19
How To Encrypt Multiple Files With Travis CI
#
travisci
#
encryption
#
devops
11
reactions
Comments
Add Comment
3 min read
Initramfs: Dropping to a Shell
Warren Parad
Warren Parad
Warren Parad
Follow
Sep 25 '19
Initramfs: Dropping to a Shell
#
linux
#
encryption
11
reactions
Comments
1
comment
4 min read
✨How to Run Secure Search over Encrypted Data
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Jun 25 '20
✨How to Run Secure Search over Encrypted Data
#
security
#
cryptography
#
encryption
#
search
11
reactions
Comments
Add Comment
4 min read
Signing Git commits with GPG keys that use modern encryption
Benjamin Black
Benjamin Black
Benjamin Black
Follow
Jan 2 '21
Signing Git commits with GPG keys that use modern encryption
#
git
#
encryption
#
gpg
#
ellipticcurve
11
reactions
Comments
2
comments
3 min read
Tor - The Onion Router
kulsoomzahra
kulsoomzahra
kulsoomzahra
Follow
for
eduAlgo
Feb 22 '21
Tor - The Onion Router
#
privacy
#
anonymity
#
encryption
#
surveillance
11
reactions
Comments
1
comment
2 min read
Implementing End to End Encryption in your Cross Platform App
Tapajyoti Bose
Tapajyoti Bose
Tapajyoti Bose
Follow
Feb 14 '21
Implementing End to End Encryption in your Cross Platform App
#
security
#
encryption
#
cryptography
#
crossplatform
11
reactions
Comments
Add Comment
2 min read
AWS Encryption Essentials: Ensuring Data Confidentiality & Safeguarding Your Cloud Assets
Brandon Damue
Brandon Damue
Brandon Damue
Follow
Aug 7 '23
AWS Encryption Essentials: Ensuring Data Confidentiality & Safeguarding Your Cloud Assets
#
aws
#
cloudsecurity
#
encryption
#
cloudcomputing
10
reactions
Comments
Add Comment
7 min read
Implementing a safe and sound API Key authorization middleware in Go
Caio Ferreira
Caio Ferreira
Caio Ferreira
Follow
Feb 8 '22
Implementing a safe and sound API Key authorization middleware in Go
#
go
#
security
#
timingattack
#
encryption
10
reactions
Comments
1
comment
8 min read
Asymmetric Encryption In PHP
Khokon M.
Khokon M.
Khokon M.
Follow
Mar 19 '22
Asymmetric Encryption In PHP
#
php
#
security
#
encryption
#
beginners
10
reactions
Comments
1
comment
2 min read
🚨 Robotic devices can be hijacked through cryptographic failures in encryption
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Jun 30 '22
🚨 Robotic devices can be hijacked through cryptographic failures in encryption
#
opensource
#
security
#
cryptography
#
encryption
10
reactions
Comments
Add Comment
1 min read
Secret Key Encryption with Go using AES
Bouchaala Reda
Bouchaala Reda
Bouchaala Reda
Follow
Jan 20 '23
Secret Key Encryption with Go using AES
#
go
#
security
#
cryptography
#
encryption
10
reactions
Comments
4
comments
6 min read
JWT Authentication with Asymmetric Encryption using certificates in ASP.NET Core
Eduard Stefanescu
Eduard Stefanescu
Eduard Stefanescu
Follow
Mar 7 '21
JWT Authentication with Asymmetric Encryption using certificates in ASP.NET Core
#
asp
#
dotnet
#
authentication
#
encryption
10
reactions
Comments
7
comments
8 min read
Encrypting Attached EBS Volumes
Adrian Mudzwiti
Adrian Mudzwiti
Adrian Mudzwiti
Follow
for
AWS Community Builders
Apr 12 '22
Encrypting Attached EBS Volumes
#
aws
#
ec2
#
encryption
#
security
10
reactions
Comments
Add Comment
3 min read
How to Share Google Docs Securely with a Google Apps Script
Trevor Foskett
Trevor Foskett
Trevor Foskett
Follow
Nov 8 '19
How to Share Google Docs Securely with a Google Apps Script
#
encryption
#
javascript
#
privacy
9
reactions
Comments
1
comment
9 min read
Acra. Features: Integrate data protection that fits your architecture
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Apr 13 '22
Acra. Features: Integrate data protection that fits your architecture
#
cryptography
#
security
#
database
#
encryption
9
reactions
Comments
1
comment
2 min read
E2EE and privacy in mobile messengers, by @vixentael
02:32
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Apr 13 '21
E2EE and privacy in mobile messengers, by @vixentael
#
security
#
cryptography
#
encryption
#
privacy
9
reactions
Comments
Add Comment
1 min read
How to Secure Webhook Endpoints with HMAC
Bru Woodring
Bru Woodring
Bru Woodring
Follow
for
Prismatic
May 25 '22
How to Secure Webhook Endpoints with HMAC
#
hmac
#
integration
#
encryption
#
webhooks
9
reactions
Comments
Add Comment
5 min read
Encrypt Data With Asymmetric AWS KMS in 5 minutes or less
Matt Tyler
Matt Tyler
Matt Tyler
Follow
Jan 20 '20
Encrypt Data With Asymmetric AWS KMS in 5 minutes or less
#
kms
#
aws
#
encryption
#
tutorial
9
reactions
Comments
Add Comment
4 min read
Acra. Features: Security events automation
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Apr 6 '22
Acra. Features: Security events automation
#
cryptography
#
security
#
database
#
encryption
9
reactions
Comments
Add Comment
2 min read
Encryption as a Service in Action
Sergio Díaz
Sergio Díaz
Sergio Díaz
Follow
Sep 15 '20
Encryption as a Service in Action
#
security
#
vault
#
encryption
9
reactions
Comments
Add Comment
5 min read
How did we create a private messenger with E2E encryption?
Max Bantsevich
Max Bantsevich
Max Bantsevich
Follow
for
dev.family
Jun 3 '21
How did we create a private messenger with E2E encryption?
#
saas
#
messenger
#
encryption
9
reactions
Comments
3
comments
3 min read
Acra. Features: Logging, audit logging and crypto-signed audit logs
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Mar 31 '22
Acra. Features: Logging, audit logging and crypto-signed audit logs
#
cryptography
#
security
#
encryption
#
database
9
reactions
Comments
Add Comment
2 min read
Asymmetric Cryptography with Golang
ElioenaiFerrari
ElioenaiFerrari
ElioenaiFerrari
Follow
Apr 5 '23
Asymmetric Cryptography with Golang
#
go
#
security
#
encryption
#
tutorial
9
reactions
Comments
Add Comment
3 min read
How to encrypt a string in Java using RSA and decrypt it in Python
Sunny Srinidhi
Sunny Srinidhi
Sunny Srinidhi
Follow
Nov 8 '19
How to encrypt a string in Java using RSA and decrypt it in Python
#
encryption
#
java
#
python
#
rsa
9
reactions
Comments
Add Comment
2 min read
Introducing Certera
certera
certera
certera
Follow
Oct 31 '19
Introducing Certera
#
webdev
#
security
#
encryption
#
letsencrypt
8
reactions
Comments
Add Comment
4 min read
Acra. Features: Authentication
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Jan 31 '22
Acra. Features: Authentication
#
cryptography
#
security
#
encryption
#
database
8
reactions
Comments
Add Comment
1 min read
Acra. Features: Tokenization
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Jan 20 '22
Acra. Features: Tokenization
#
cryptography
#
security
#
encryption
#
database
8
reactions
Comments
Add Comment
1 min read
Where to use encryption 🤔
Rumesh Madhusanka
Rumesh Madhusanka
Rumesh Madhusanka
Follow
Dec 28 '19
Where to use encryption 🤔
#
help
#
beginners
#
encryption
#
react
8
reactions
Comments
2
comments
1 min read
Acra. Features: Data masking
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Dec 8 '21
Acra. Features: Data masking
#
cryptography
#
security
#
encryption
#
database
8
reactions
Comments
Add Comment
1 min read
Basics of Encryption: The Diffie-Hellman Key Exchange Explained
Simon Pfeiffer
Simon Pfeiffer
Simon Pfeiffer
Follow
for
Codesphere Inc.
Jun 29 '22
Basics of Encryption: The Diffie-Hellman Key Exchange Explained
#
encryption
#
algorithms
#
security
#
python
8
reactions
Comments
Add Comment
4 min read
How to encrypt database fields transparently for your app using Acra and DigitalOcean managed PostgreSQL
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Aug 7 '20
How to encrypt database fields transparently for your app using Acra and DigitalOcean managed PostgreSQL
#
tutorial
#
encryption
#
security
8
reactions
Comments
3
comments
11 min read
Acra. Features: Application-level encryption
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Dec 2 '21
Acra. Features: Application-level encryption
#
cryptography
#
security
#
encryption
#
database
8
reactions
Comments
Add Comment
3 min read
Encrypted Contact Form in Vue
David Boland
David Boland
David Boland
Follow
Nov 27 '19
Encrypted Contact Form in Vue
#
encryption
#
webdev
#
vue
8
reactions
Comments
2
comments
5 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account