|
You are here |
neilmadden.blog | ||
| | | | |
soatok.blog
|
|
| | | | | Recently, it occurred to me that there wasn't a good, focused resource that covers commitments in the context of asymmetric cryptography. I had covered confused deputy attacks in my very short (don't look at the scroll bar) blog post on database cryptography., and that's definitely relevant. I had also touched on the subject of commitment... | |
| | | | |
blog.hboeck.de
|
|
| | | | | [AI summary] The blog post discusses a security vulnerability in Owncloud's encryption module, highlighting its weaknesses in cryptographic design and the risks of implementing custom encryption protocols without proper expertise. | |
| | | | |
artsy.github.io
|
|
| | | | | Encrypting ActiveRecord Fields Without Downtime. May 30,... | |
| | | | |
blog.martinig.ch
|
|
| | | Architecture is an important asset for good programming and the notion of "pattern" is here to help us apply already trusted code architecture solutions to common problems. Jason McDonald has done a wonderful job to group some of them in a document that should be useful to most software developers. Go to his blog to | ||