Cossack LabsFind our engineering posts on Dev.toHi! Glad to see you popped in! Please find an update on where to read us.Jun 15, 2020Jun 15, 2020
Cossack LabsSecure Search Over Encrypted DataWhat is searchable encryption and how to perform secure search over encrypted data.Jul 26, 2019Jul 26, 2019
Cossack LabsAcra on DigitalOcean MarketplaceAcra encryption suite is now available as 1-Click App running in a Droplet on DigitalOcean Marketplace.Apr 16, 2019Apr 16, 2019
Cossack LabsinHackerNoon.comA short horror story about web app data leaks and how to prevent themHow to improve your database securityFeb 6, 2019Feb 6, 2019
Cossack LabsinHackerNoon.comExplain Like I'm Five: Poison Records (Honeypots for Database Tables)What are poison records and how you can detect massive database breaches and leaks using them.Aug 16, 2018Aug 16, 2018
Cossack LabsinHackerNoon.comThe Geography of BansGovernments Opposing Encryption and Secure Means of CommunicationJul 23, 2018Jul 23, 2018
Cossack LabsTop Security & Crypto Fails of 2017A Very Subjective List of the notable security and, specifically, cryptographic fails of the yearDec 31, 2017Dec 31, 2017
Cossack LabsinHackerNoon.comExplain Like I’m 5: Zero Knowledge Proof (Halloween Edition)Explaining crypto is hard, explaining crypto in simple words is harder. Explaining Zero Knowledge Proof to a child? Easy!Oct 26, 20179Oct 26, 20179
Cossack LabsinHackerNoon.comBuilding Application Backends with End-to-end EncryptionA closer look at the well-documented, but rarely implemented properties of end-to-end encryption.Oct 18, 2017Oct 18, 2017
Cossack LabsExplain Like I’m 5: End-to-end EncryptionEnd-to-end encryption in simple words. You’re most likely using it already. Time to find out what it is and why you should keep using it asSep 28, 20171Sep 28, 20171