Guénolé de CadoudalinApplication SecuritySocial login in 5 minutes chronoYou need to enable the end users of your web site to identify themselves but you have no desire or capacity to handle and authentication…Jan 18, 2021Jan 18, 2021
Guénolé de CadoudalinApplication SecurityHow to create a Keycloak authenticator as a microservice?We have been using Keycloak for some time now, for various types of projects and several use-cases. It provides great flexibility and…Jun 28, 20201Jun 28, 20201
Guénolé de CadoudalinApplication SecurityOpenID Connect tester for developersWhen you are a developer and you need to configure an identity provider and get the ID Token and Access Token content right, you often…Jun 26, 2020Jun 26, 2020
Guénolé de CadoudalinEthereum ResearchEthereum Privacy presented to AssEthOn June 26th 2019 I was invited to present how Ethereum Privacy can solve the private blockchain building with no effort while keeping it…Jul 2, 2019Jul 2, 2019
Guénolé de CadoudalinEthereum ResearchEthereum Privacy use case : Call for tenderDemonstrate how a realistic use-case can be implemented safely using Ethereum Privacy over a public blockchain.May 7, 2019May 7, 2019
Guénolé de CadoudalinEthereum ResearchEthereum Privacy: Proof of transactionThis third publication on Ethereum Privacy explains how to extract a proof of a private transaction done over a public blockchain.Apr 27, 2019Apr 27, 2019
Guénolé de CadoudalinEthereum ResearchEthereum Privacy : Get started now.Ethereum Privacy leverage the public blockchain infrastructure while maintaining the confidentiality of your transactionsApr 8, 2019Apr 8, 2019
Guénolé de CadoudalinEthereum ResearchPrivate transactions over a public blockchain made easy.Introducing a new solution for confidential businessesApr 2, 20191Apr 2, 20191