Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
encryption
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Enhancing Security: Streamlined Solutions for Safely Sharing Sensitive Files Within Teams
Marina Kovalchuk
Marina Kovalchuk
Marina Kovalchuk
Follow
Mar 3
Enhancing Security: Streamlined Solutions for Safely Sharing Sensitive Files Within Teams
#
security
#
encryption
#
workflows
#
friction
Comments
Add Comment
11 min read
Online Code Editors Expose Sensitive Data: Implementing End-to-End Encryption and User Consent as Solutions
Maxim Gerasimov
Maxim Gerasimov
Maxim Gerasimov
Follow
Mar 2
Online Code Editors Expose Sensitive Data: Implementing End-to-End Encryption and User Consent as Solutions
#
security
#
encryption
#
privacy
#
developers
1
reaction
Comments
Add Comment
7 min read
Cipher Suite Explained Component by Component
Sanjay Ghosh
Sanjay Ghosh
Sanjay Ghosh
Follow
Mar 2
Cipher Suite Explained Component by Component
#
tls
#
cipher
#
encryption
#
security
5
reactions
Comments
2
comments
1 min read
BCrypt vs Argon2: Password Hashing in .NET – A Practical Deep Dive
ZèD
ZèD
ZèD
Follow
Feb 28
BCrypt vs Argon2: Password Hashing in .NET – A Practical Deep Dive
#
dotnet
#
bcrypt
#
argon2
#
encryption
Comments
Add Comment
2 min read
pagevault: Hiding an Encryption Platform Inside HTML
Alex Towell
Alex Towell
Alex Towell
Follow
Feb 24
pagevault: Hiding an Encryption Platform Inside HTML
#
python
#
encryption
#
webdev
#
security
1
reaction
Comments
Add Comment
4 min read
How I Built an E2E Encrypted File Transfer in Python — and What Came Out of It
Артем Марченко
Артем Марченко
Артем Марченко
Follow
Feb 23
How I Built an E2E Encrypted File Transfer in Python — and What Came Out of It
#
python
#
security
#
opensource
#
encryption
1
reaction
Comments
Add Comment
4 min read
Post-Quantum Cryptography for DKIM, PGP, and S/MIME
Certera
Certera
Certera
Follow
Feb 23
Post-Quantum Cryptography for DKIM, PGP, and S/MIME
#
encryption
#
pqc
#
dkim
#
cryptography
Comments
Add Comment
5 min read
Secure PIN Processing: A Deep Dive into ISO 9564-1 PIN Blocks, RSA, and AES Encryption
instanceofGod
instanceofGod
instanceofGod
Follow
Feb 13
Secure PIN Processing: A Deep Dive into ISO 9564-1 PIN Blocks, RSA, and AES Encryption
#
security
#
pin
#
encryption
#
fintech
Comments
Add Comment
7 min read
Building a Secure Email Migration Tool: OAuth, Encryption, and Privacy by Design
Jayen Ashar
Jayen Ashar
Jayen Ashar
Follow
Feb 9
Building a Secure Email Migration Tool: OAuth, Encryption, and Privacy by Design
#
security
#
oauth
#
encryption
#
webdev
Comments
Add Comment
4 min read
The Cryptographic Pivot: From Symmetric to Asymmetric Efficiency
AIshwarya Kumar
AIshwarya Kumar
AIshwarya Kumar
Follow
Jan 30
The Cryptographic Pivot: From Symmetric to Asymmetric Efficiency
#
discuss
#
programming
#
encryption
#
security
Comments
Add Comment
3 min read
Stop Managing Encryption Keys: Vault-as-a-Service in 5 Minutes
Alain Airom
Alain Airom
Alain Airom
Follow
Jan 26
Stop Managing Encryption Keys: Vault-as-a-Service in 5 Minutes
#
hashicorpvault
#
encryption
#
bob
#
security
Comments
Add Comment
13 min read
GPG Isn’t Broken, You’re Just Using It Wrong
Alex Fler
Alex Fler
Alex Fler
Follow
Jan 25
GPG Isn’t Broken, You’re Just Using It Wrong
#
security
#
encryption
#
linux
#
sysadmin
Comments
Add Comment
5 min read
🔐 AWS 141: Data Protection at Rest - Mastering AWS KMS for File Encryption
Hritik Raj
Hritik Raj
Hritik Raj
Follow
Jan 21
🔐 AWS 141: Data Protection at Rest - Mastering AWS KMS for File Encryption
#
aws
#
kms
#
encryption
#
100daysofcloud
Comments
Add Comment
3 min read
Trust No One: Implementing True End-to-End Encryption with Insertable Streams
Lalit Mishra
Lalit Mishra
Lalit Mishra
Follow
Feb 16
Trust No One: Implementing True End-to-End Encryption with Insertable Streams
#
python
#
webrtc
#
security
#
encryption
3
reactions
Comments
Add Comment
8 min read
Building a Data Visualization and Note-Taking Web App
Usman
Usman
Usman
Follow
Jan 28
Building a Data Visualization and Note-Taking Web App
#
analysis
#
encryption
#
fullstack
#
webdev
Comments
2
comments
4 min read
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account