Articles by Tag #encryption

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

A Better Password Authentication Flow.. hear me out

Auth is one of those topics everyone touches but few explore deeply. Most posts repeat the same...

Learn More 8 0Nov 10

PyKryptor - open source AxCrypt alternative

I built my own encryption tool in Python (+ some C) that uses modern AEAD algorithms like AES-256-GCM...

Learn More 0 0Nov 10

File Chunking: Why It Matters for Cybersecurity in Modern Applications

What Is File Chunking? “Chunking” means splitting a large file into many smaller pieces...

Learn More 0 0Nov 4

Tokenization vs. Encryption for Payment Data Security

When you’re building a payment system, data protection and security are always top of mind. You’re...

Learn More 10 0Oct 24

NGINX Technical Practice: Configuration Guide for TCP Layer 4 Port Proxy and mTLS Mutual Encryption Authentication

This article systematically breaks down the complete implementation of Nginx TCP Layer 4 port proxy...

Learn More 0 0Nov 23

🔐 10 Core Concepts Every Developer Should Know About Data Security

Encryption Turns readable data (plaintext) into unreadable code (ciphertext) using a key. ✅ Used...

Learn More 3 0Oct 15

Signing and Encryption With JWS and JWE

Today, we would like to cover two topics that are often confusing: signing and encryption, along with...

Learn More 2 0Oct 5

Nathbrok — Encrypted Messaging, File Storage & Business Communications Platform

I've been building Nathbrok, a secure communication platform designed for individuals and businesses...

Learn More 0 0Nov 28

Oracle Autonomous Database Security: Maintenance, Access Control, and Encryption

Oracle Autonomous Database implements comprehensive security measures spanning automated maintenance,...

Learn More 1 0Oct 8

The #1 Mistake Developers Make with Payment Data — and How to Fix It

APIs and payment tokens are the real attack surface in 2025 — not your UI. If your backend or client...

Learn More 0 0Oct 14

How We Built Zero-Knowledge Encryption in the Browser

How We Built Zero-Knowledge Encryption in the Browser (So We Can't Read Your Notes) Most...

Learn More 0 2Jul 26

Offline Messaging Reinvented with Bitchat

In July 2025, Jack Dorsey's Bitchat white paper introduces a decentralized peer-to-peer messaging app...

Learn More 8 0Jul 29

Qeltrix V3: Asymmetric Key Transport and the Universal Dispatcher Era

Secure Key Exchange Meets Content-Derived Encryption I'm thrilled to announce Qeltrix V3, the most...

Learn More 5 0Nov 26

Microsoft Certified Azure Administrator Associate Exam (AZ-104) Lab Preparation #5: Azure Disk Encryption

Introduction To pass the AZ-104 exam, you must complete several live online lab tests....

Learn More 6 0Jan 7

Queryable Encryption With Spring Data MongoDB: How to Query Encrypted Fields

Information is one of the most valuable assets in computing and keeping it protected is even more...

Learn More 9 0Aug 6

Lightweight Encryption: The Power of Vigenère

This article was co-authored by @gums Introduction Numerous times we have heard people...

Learn More 17 0Apr 24

Go Security Guide: Tokens, SHA1, RSA & AES Encryption

Introduction Security is critical in modern applications. Go provides robust standard...

Learn More 2 0Nov 12

How to Secure Your Intranet with SSL: A Developer’s Guide

Introduction: Intranet applications are often the backbone of an organization’s internal...

Learn More 1 0May 9

Getting Started With Queryable Encryption in the MongoDB C# Driver

With the release of MongoDB 7.0 in August 2023, we introduced a feature called Queryable Encryption,...

Learn More 5 0Apr 8

A Deep Dive into WhatsApp’s Encryption: Identity, Keys, and Message Security

WhatsApp's End-to-End Encryption End-to-End Encryption (E2EE) is a way to keep your...

Learn More 9 3Jan 15

Unveiling A Groundbreaking Open-Source Encrypted Machine Learning Framework

In a significant advancement for data security and machine learning, Vaultree has unveiled the VENum...

Learn More 1 2Dec 10 '24

How to automatically decrypt a LUKS LVM setup on boot with a USB

This guide walks you through a robust procedure to auto-decrypt a LUKS-on-LVM setup at boot with a...

Learn More 2 0Jun 25

Security Redefined: Introducing DaggerX V3.0.0 for Unbreakable PHP Protection

🔒 Security Redefined: Introducing DaggerX V3.0.0 for Unbreakable PHP Protection In today’s threat...

Learn More 0 0Mar 26

Secure Text Encryption and Decryption with Vanilla JavaScript

In today’s digital age, securing sensitive information like API keys, passwords, and user data is...

Learn More 5 0Dec 3 '24

Laravel Data Encryption and Decryption

This guide explains how to implement encryption and decryption for sensitive data in Laravel models....

Learn More 2 2Dec 11 '24

Implementing Robust AWS Security: IAM Best Practices and Encryption Strategies

Identity and Access Management (IAM) Best Practices Managing User Permissions...

Learn More 0 0Apr 25

Unlocking AI's Potential: Secure Language Models for Sensitive Data

Unlocking AI's Potential: Secure Language Models for Sensitive Data Imagine leveraging...

Learn More 5 0Sep 11

Unlocking AWS KMS: The Security Professional's Guide to Encryption

In the cloud, data is the crown jewels, and encryption is the vault. At the heart of AWS's data...

Learn More 0 0Jul 21

Full Disk Encryption (FDE) with Ubuntu Autoinstall

🔍 Context As system administrators and security-conscious developers, encrypting data at...

Learn More 1 0Jun 25

Cryptographic Implementation Flaws: Modern Encryption Analysis

Cryptographic Implementation Flaws: Modern Encryption Analysis ...

Learn More 1 0Aug 10