 
      
    | You are here | alexsci.com | ||
| | | | | techblog.bozho.net | |
| | | | | Tension has been high in the past months regarding a proposed change to the European eIDAS regulation which defines trust services, digital identity, and the so-called QWACs - qualified websiteContinue reading | |
| | | | | littlemaninmyhead.wordpress.com | |
| | | | | Certificate pinning ("cert pinning" for short) is a technique used for mobile applications to add an extra layer of protection to secure communications. Some people additionally use the technique to prevent people from reverse engineering APIs via intercepting proxies, however this latter objective is hard to achieve against a determined hacker. Certificate pinning offers very... | |
| | | | | dadrian.io | |
| | | | | This post is about HTTPS (X.509) certificates used on the web1. It has two parts: Certificates explained without cryptography Certificates explained with cryptography The explanation with cryptography depends on the explanation without cryptography, so you'll want to either read both, or only read Part 1. Certificates and certification authorities, explained without cryptography Websites use certificates to prove that they're the "real" website2, and not an imposter. The certificate is used to bootstrap ... | |
| | | | | konghq.com | |
| | | APIs introduce new security vulnerabilities including injection attacks, broken authentication, sensitive data exposure, and more. This guide covers the top API security risks developers face and provides actionable steps for mitigating them. | ||