DEV Community

# encryption

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why anti-encryption laws are crazy

Why anti-encryption laws are crazy

68
Comments 8
4 min read
HTTPS , TLS, SSL, CA, Encryption & MITM attack !

HTTPS , TLS, SSL, CA, Encryption & MITM attack !

55
Comments 1
4 min read
Understanding Hacking 101...

Understanding Hacking 101...

53
Comments 8
3 min read
Building HIPAA Compliant End-to-End Encrypted Chat with Stream React Chat and Virgil Security

Building HIPAA Compliant End-to-End Encrypted Chat with Stream React Chat and Virgil Security

36
Comments 1
9 min read
What is the difference between encryption, hashing and salting?

What is the difference between encryption, hashing and salting?

31
Comments 4
6 min read
Bringing Your (Encryption) Keys to Multi/Hybrid Clouds

Bringing Your (Encryption) Keys to Multi/Hybrid Clouds

26
Comments
9 min read
Encrypt and Decrypt Data in Node.js using aes-256-cbc

Encrypt and Decrypt Data in Node.js using aes-256-cbc

25
Comments 8
6 min read
Generating Random Password in Python - Practical Guide

Generating Random Password in Python - Practical Guide

22
Comments 6
7 min read
Automatic Laravel Data Encryption with Eloquent

Automatic Laravel Data Encryption with Eloquent

20
Comments 11
2 min read
What is: Linux keyring, gnome-keyring, Secret Service, and D-Bus

What is: Linux keyring, gnome-keyring, Secret Service, and D-Bus

20
Comments 1
22 min read
KeePass: SSH keys passwords storage and decryption on Linux

KeePass: SSH keys passwords storage and decryption on Linux

18
Comments
4 min read
JWT Authentication with Symmetric Encryption in ASP.NET Core

JWT Authentication with Symmetric Encryption in ASP.NET Core

16
Comments 1
9 min read
Stop using the environment variables for sensitive keys in Rails

Stop using the environment variables for sensitive keys in Rails

15
Comments
4 min read
Use strong encryption and hashing algorithms in Java

Use strong encryption and hashing algorithms in Java

15
Comments 3
2 min read
Creating an end-to-end encrypted chat with GetStream.io and seald.io

Creating an end-to-end encrypted chat with GetStream.io and seald.io

14
Comments
8 min read
Implementing End to End Encryption in your Cross Platform App

Implementing End to End Encryption in your Cross Platform App

14
Comments
5 min read
#Hash Vs Encryption?

#Hash Vs Encryption?

14
Comments 1
3 min read
2 free data security tools every dev should know (and use)

2 free data security tools every dev should know (and use)

13
Comments 3
2 min read
Encryption without passwords

Encryption without passwords

13
Comments
6 min read
How we implemented encryption and data masking for 60+ apps in 12 weeks

How we implemented encryption and data masking for 60+ apps in 12 weeks

13
Comments
3 min read
Will Banning Cryptography Keep the Country Safe?

Will Banning Cryptography Keep the Country Safe?

12
Comments
3 min read
Complicated encryption ways explained in 2 min, by @vixentael 02:31

Complicated encryption ways explained in 2 min, by @vixentael

12
Comments
1 min read
Hide Your Keys Hide Your Wife!

Hide Your Keys Hide Your Wife!

12
Comments
5 min read
OCSP and CRL: what could go wrong?

OCSP and CRL: what could go wrong?

12
Comments
3 min read
How Facebook Avoids Ad Blockers

How Facebook Avoids Ad Blockers

12
Comments
3 min read
Encryption & decryption for r0@drunner$

Encryption & decryption for r0@drunner$

12
Comments
3 min read
Encryption in ⛅ cloud native apps

Encryption in ⛅ cloud native apps

11
Comments
3 min read
How To Encrypt Multiple Files With Travis CI

How To Encrypt Multiple Files With Travis CI

11
Comments
3 min read
Initramfs: Dropping to a Shell

Initramfs: Dropping to a Shell

11
Comments 1
4 min read
✨How to Run Secure Search over Encrypted Data

✨How to Run Secure Search over Encrypted Data

11
Comments
4 min read
Signing Git commits with GPG keys that use modern encryption

Signing Git commits with GPG keys that use modern encryption

11
Comments 2
3 min read
Tor - The Onion Router

Tor - The Onion Router

11
Comments 1
2 min read
Implementing End to End Encryption in your Cross Platform App

Implementing End to End Encryption in your Cross Platform App

11
Comments
2 min read
AWS Encryption Essentials: Ensuring Data Confidentiality & Safeguarding Your Cloud Assets

AWS Encryption Essentials: Ensuring Data Confidentiality & Safeguarding Your Cloud Assets

10
Comments
7 min read
Implementing a safe and sound API Key authorization middleware in Go

Implementing a safe and sound API Key authorization middleware in Go

10
Comments 1
8 min read
Asymmetric Encryption In PHP

Asymmetric Encryption In PHP

10
Comments 1
2 min read
🚨 Robotic devices can be hijacked through cryptographic failures in encryption

🚨 Robotic devices can be hijacked through cryptographic failures in encryption

10
Comments
1 min read
Secret Key Encryption with Go using AES

Secret Key Encryption with Go using AES

10
Comments 4
6 min read
JWT Authentication with Asymmetric Encryption using certificates in ASP.NET Core

JWT Authentication with Asymmetric Encryption using certificates in ASP.NET Core

10
Comments 7
8 min read
Encrypting Attached EBS Volumes

Encrypting Attached EBS Volumes

10
Comments
3 min read
How to Share Google Docs Securely with a Google Apps Script

How to Share Google Docs Securely with a Google Apps Script

9
Comments 1
9 min read
Acra. Features: Integrate data protection that fits your architecture

Acra. Features: Integrate data protection that fits your architecture

9
Comments 1
2 min read
E2EE and privacy in mobile messengers, by @vixentael 02:32

E2EE and privacy in mobile messengers, by @vixentael

9
Comments
1 min read
How to Secure Webhook Endpoints with HMAC

How to Secure Webhook Endpoints with HMAC

9
Comments
5 min read
Encrypt Data With Asymmetric AWS KMS in 5 minutes or less

Encrypt Data With Asymmetric AWS KMS in 5 minutes or less

9
Comments
4 min read
Acra. Features: Security events automation

Acra. Features: Security events automation

9
Comments
2 min read
Encryption as a Service in Action

Encryption as a Service in Action

9
Comments
5 min read
How did we create a private messenger with E2E encryption?

How did we create a private messenger with E2E encryption?

9
Comments 3
3 min read
Acra. Features: Logging, audit logging and crypto-signed audit logs

Acra. Features: Logging, audit logging and crypto-signed audit logs

9
Comments
2 min read
Asymmetric Cryptography with Golang

Asymmetric Cryptography with Golang

9
Comments
3 min read
How to encrypt a string in Java using RSA and decrypt it in Python

How to encrypt a string in Java using RSA and decrypt it in Python

9
Comments
2 min read
Introducing Certera

Introducing Certera

8
Comments
4 min read
Acra. Features: Authentication

Acra. Features: Authentication

8
Comments
1 min read
Acra. Features: Tokenization

Acra. Features: Tokenization

8
Comments
1 min read
Where to use encryption 🤔

Where to use encryption 🤔

8
Comments 2
1 min read
Acra. Features: Data masking

Acra. Features: Data masking

8
Comments
1 min read
Basics of Encryption: The Diffie-Hellman Key Exchange Explained

Basics of Encryption: The Diffie-Hellman Key Exchange Explained

8
Comments
4 min read
How to encrypt database fields transparently for your app using Acra and DigitalOcean managed PostgreSQL

How to encrypt database fields transparently for your app using Acra and DigitalOcean managed PostgreSQL

8
Comments 3
11 min read
Acra. Features: Application-level encryption

Acra. Features: Application-level encryption

8
Comments
3 min read
Encrypted Contact Form in Vue

Encrypted Contact Form in Vue

8
Comments 2
5 min read
loading...