|
You are here |
blog.cryptographyengineering.com | ||
| | | | |
infinum.com
|
|
| | | | | Enhance your app's security and user experience with passwordless authentication methods. Say goodbye to passwords and hello to convenience. | |
| | | | |
palant.info
|
|
| | | | | Allowing password-based authentication without letting the server know the password is fascinating. Unfortunately, for web applications this doesn't solve any problems. | |
| | | | |
www.cossacklabs.com
|
|
| | | | | Designed for securing online accounts, FIDO U2F as a protocol and YubiKey as a hardware tool are not silver bullets. If not used wisely, this powerful combo becomes an attractive target in the hands of skilful attackers. | |
| | | | |
www.creativehuddle.co.uk
|
|
| | | Designed byJ.P. Guilfordin 1967, the Alternative Uses Test asks you to think of as many uses as possible for a simple object, like a brick or a shoe or a paperclip. | ||