A Better Way to Protect Your Database IDs8 mins· · 2019 · Claps 44A new approach on protecting your internal IDs with a strong cryptographic schema and many other useful features. Inspired by HashIds.
Security Best Practices: Symmetric Encryption with AES in Java and Android: Part 210 mins· · 2018 · Claps 289If you can’t use authenticated encryption like AES+GCM, this article will show how and why to use AES+CBC with Ecrypt-then-Mac with HMAC.
The Bcrypt Protocol… is kind of a mess7 mins· · 2018 · Claps 72While writing my own bcrypt library, I discovered a lot of odd things surrounding the bcrypt protocol.
Security Best Practices: Symmetric Encryption with AES in Java and Android12 mins· · 2018 · Claps 2801What to consider when encrypting your data and how to correctly implement it with AES-GCM.