DEV Community

Paulo Renato profile picture

Paulo Renato

I am a Developer Advocate for Security in Mobile Apps and APIs at approov.io. Another passion is the Elixir programming language that was designed to be concurrent, distributed and fault tolerant.

Location Scotland Joined Joined on  Personal website https://exadra37.com github website

Education

Self teached Developer

Work

Developer Advocate for Mobile and API Security at approov.io

Ask me Anything About Certificate Pinning

Ask me Anything About Certificate Pinning

Comments 2
2 min read

Want to connect with Paulo Renato?

Create an account to connect with Paulo Renato. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Approov Serverless Reverse Proxy in the AWS API Gateway

Approov Serverless Reverse Proxy in the AWS API Gateway

4
Comments
10 min read
Using a Reverse Proxy to Protect Third Party APIs

Using a Reverse Proxy to Protect Third Party APIs

12
Comments
7 min read
How to Protect Against Certificate Pinning Bypassing

How to Protect Against Certificate Pinning Bypassing

8
Comments
13 min read
Bypassing Certificate Pinning

Bypassing Certificate Pinning

10
Comments
6 min read
Securing HTTPS with Certificate Pinning on Android

Securing HTTPS with Certificate Pinning on Android

14
Comments
13 min read
Steal That Api Key With A Man In The Middle Attack

Steal That Api Key With A Man In The Middle Attack

50
Comments 2
9 min read
Google and Samsung Fix Android Flaw that Allowed to Hijack your Camera and Audio to Spy on You

Google and Samsung Fix Android Flaw that Allowed to Hijack your Camera and Audio to Spy on You

6
Comments
3 min read
Bypassing GitHub's OAuth flow

Bypassing GitHub's OAuth flow

13
Comments
2 min read
Hackers are using a bug in PHP7 to remotely hijack web servers

Hackers are using a bug in PHP7 to remotely hijack web servers

13
Comments
2 min read
Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted

Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted

8
Comments 1
1 min read
Millions of Phones Leaking Information Via Tor

Millions of Phones Leaking Information Via Tor

8
Comments
2 min read
Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks

Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks

6
Comments
2 min read
This huge Android trojan malware campaign was discovered after the gang behind it made basic security mistakes

This huge Android trojan malware campaign was discovered after the gang behind it made basic security mistakes

7
Comments 5
2 min read
Attackers exploit 0day vulnerability that gives full control of Android phones

Attackers exploit 0day vulnerability that gives full control of Android phones

6
Comments 2
2 min read
The iOS Checkm8 jailbreak is hugely significant, but not for you

The iOS Checkm8 jailbreak is hugely significant, but not for you

5
Comments
1 min read
Android Devices Being Shipped with TCP Port 5555 Enabled

Android Devices Being Shipped with TCP Port 5555 Enabled

11
Comments 3
2 min read
Browser Based Cyber Threats

Browser Based Cyber Threats

13
Comments 3
2 min read
Containers Under Attack

Containers Under Attack

20
Comments 9
1 min read
Do you know that DNS queries do not protect your privacy?

Do you know that DNS queries do not protect your privacy?

13
Comments 1
1 min read
Raising security awareness with a CTF competition... did you already participate in one, how it was?

Raising security awareness with a CTF competition... did you already participate in one, how it was?

7
Comments
1 min read
Revenge Hacking Is Hitting the Big Time

Revenge Hacking Is Hitting the Big Time

29
Comments 4
1 min read
loading...