Explore >> Select a destination


You are here

blog.trailofbits.com
| | lukasrotermund.de
3.8 parsecs away

Travel
| | In this article, I explain how FIDO2 keys work technically and how they protect their users from phishing attacks - for non-technical beginners as well as experienced software developers.
| | huanliu.wordpress.com
4.0 parsecs away

Travel
| | Apple announced Passkey in WWDC'22 a couple of months ago. Both Microsoft and Google quickly followed suit, announcing their support in the RSA and IdentiVerse conferences. Passkey is promising to potentially replace passwords eventually, but the road to that promise may be long and bumpy. There are at least 3 issues that will prevent a...
| | soatok.blog
5.3 parsecs away

Travel
| | Every time I lightly touch on this point, I always get someone who insists on arguing with me about it, so I thought it would be worth making a dedicated, singular-focused blog post about this topic without worrying too much about tertiary matters. Here's the TL;DR: If you actually built your cryptography properly, you shouldn't...
| | dzone.com
28.2 parsecs away

Travel
| We examine cookie and token-based authentication, advantages of using tokens, and address common questions developers have regarding token-based auth.