|
You are here |
scottarc.blog | ||
| | | | |
blog.basistheory.com
|
|
| | | | | Understand how tokenization impacts PCI compliance. Tokenize anything to secure protected data! | |
| | | | |
soatok.blog
|
|
| | | | | Recently, it occurred to me that there wasn't a good, focused resource that covers commitments in the context of asymmetric cryptography. I had covered confused deputy attacks in my very short (don't look at the scroll bar) blog post on database cryptography., and that's definitely relevant. I had also touched on the subject of commitment... | |
| | | | |
textslashplain.com
|
|
| | | | | Back in February, I wrote about browser password managers and mentioned that it's important to understand the threat model when deciding how to implement features and their security protections. Generally speaking, "keeping secrets from yourself" is a fool's errand, so it's a waste of time and effort to encrypt data if you have to store... | |
| | | | |
www.mikekasberg.com
|
|
| | | Several weeks ago, I wrote a blog post about how horrible it is to have to deal with the various password restrictions websites use. Of... | ||