A Better Way to Protect Your Database IDs26 April 2019·1554 words·8 mins· Medium · 43CybersecurityA new approach on protecting your internal IDs with a strong cryptographic schema and many other useful features. Inspired by HashIds.
Security Best Practices: Symmetric Encryption with AES in Java and Android: Part 212 November 2018·1979 words·10 mins· Medium · 289CybersecurityIf you can’t use authenticated encryption like AES+GCM, this article will show how and why to use AES+CBC with Ecrypt-then-Mac with HMAC.
The Bcrypt Protocol… is kind of a mess7 November 2018·1398 words·7 mins· Medium · 72Cybersecurity ProgrammingWhile writing my own bcrypt library, I discovered a lot of odd things surrounding the bcrypt protocol.
Security Best Practices: Symmetric Encryption with AES in Java and Android6 January 2018·2557 words·13 mins· Medium · 2795Javascript Android Dev Cybersecurity ProgrammingWhat to consider when encrypting your data and how to correctly implement it with AES-GCM.