|
You are here |
educatedguesswork.org | ||
| | | | |
cronokirby.com
|
|
| | | | | - Read more: https://cronokirby.com/posts/2021/07/on_multi_set_hashing/ | |
| | | | |
dgroshev.com
|
|
| | | | | [AI summary] The author discusses the challenges and solutions for implementing a secure, privacy-preserving BitTorrent connectivity testing tool using cryptographic techniques like asymmetric encryption and HMAC to protect user IP addresses. | |
| | | | |
soatok.blog
|
|
| | | | | Programmers don't understand hash functions, and I can demonstrate this to most of the people that will read this with a single observation: When you saw the words "hash function" in the title, you might have assumed this was going to be a blog post about password storage. (Passwords are the most common knee-jerk reaction... | |
| | | | |
philodev.one
|
|
| | | oAuth is a hard to get into because of its (necessary) complexity. A basic understanding of the standard flow and the actors involved can help to make better decisions and understand the security implications of the choices. | ||