A new approach on protecting your internal IDs with a strong cryptographic schema and many other useful features. Inspired by HashIds.
If you can’t use authenticated encryption like AES+GCM, this article will show how and why to use AES+CBC with Ecrypt-then-Mac with HMAC.
While writing my own bcrypt library, I discovered a lot of odd things surrounding the bcrypt protocol.
What to consider when encrypting your data and how to correctly implement it with AES-GCM.