|
You are here |
emilymstark.com | ||
| | | | |
dadrian.io
|
|
| | | | | This post is about HTTPS (X.509) certificates used on the web1. It has two parts: Certificates explained without cryptography Certificates explained with cryptography The explanation with cryptography depends on the explanation without cryptography, so you'll want to either read both, or only read Part 1. Certificates and certification authorities, explained without cryptography Websites use certificates to prove that they're the "real" website2, and not an imposter. The certificate is used to bootstrap ... | |
| | | | |
littlemaninmyhead.wordpress.com
|
|
| | | | | Certificate pinning ("cert pinning" for short) is a technique used for mobile applications to add an extra layer of protection to secure communications. Some people additionally use the technique to prevent people from reverse engineering APIs via intercepting proxies, however this latter objective is hard to achieve against a determined hacker. Certificate pinning offers very... | |
| | | | |
adamu.jp
|
|
| | | | | [AI summary] The author details the process of creating a personal TLS certificate authority to secure internal services without exposing them to the public internet. | |
| | | | |
www.isc.org
|
|
| | | BIND 9 fully supports DNSSEC and we encourage the use of DNSSEC as a best practice | ||