Find our engineering posts on Dev.toHi! Glad to see you popped in! Please find an update on where to read us.Jun 15, 2020Jun 15, 2020
Secure Search Over Encrypted DataWhat is searchable encryption and how to perform secure search over encrypted data.Jul 26, 2019Jul 26, 2019
Acra on DigitalOcean MarketplaceAcra encryption suite is now available as 1-Click App running in a Droplet on DigitalOcean Marketplace.Apr 16, 2019Apr 16, 2019
Published inHackerNoon.comA short horror story about web app data leaks and how to prevent themHow to improve your database securityFeb 6, 2019Feb 6, 2019
Published inHackerNoon.comExplain Like I'm Five: Poison Records (Honeypots for Database Tables)What are poison records and how you can detect massive database breaches and leaks using them.Aug 16, 2018Aug 16, 2018
Published inHackerNoon.comThe Geography of BansGovernments Opposing Encryption and Secure Means of CommunicationJul 23, 2018Jul 23, 2018
Top Security & Crypto Fails of 2017A Very Subjective List of the notable security and, specifically, cryptographic fails of the yearDec 31, 2017Dec 31, 2017
Published inHackerNoon.comExplain Like I’m 5: Zero Knowledge Proof (Halloween Edition)Explaining crypto is hard, explaining crypto in simple words is harder. Explaining Zero Knowledge Proof to a child? Easy!Oct 26, 20179Oct 26, 20179
Published inHackerNoon.comBuilding Application Backends with End-to-end EncryptionA closer look at the well-documented, but rarely implemented properties of end-to-end encryption.Oct 18, 2017Oct 18, 2017
Explain Like I’m 5: End-to-end EncryptionEnd-to-end encryption in simple words. You’re most likely using it already. Time to find out what it is and why you should keep using it asSep 28, 20171Sep 28, 20171