Jim HawkinsinVMware 360Checking Device Cryptography Capabilities on Android and iOSFifth in a series comparing the cryptographic programming interfaces of Android and iOS.Sep 6, 2023Sep 6, 2023
Jim HawkinsinVMware 360UML For Explaining CryptographyUML diagrams can be used to explain the cryptography of an enterprise security solution. I know because I’ve contributed to security white…Dec 2, 2022Dec 2, 2022
Jim HawkinsHi, There seems to be a limitation in WKScriptMessageHandler that there isn't a returned value from…If you need a return value, you can instead do this.Jan 28, 2022Jan 28, 2022
Jim HawkinsinVMware 360Differences Between Text Decryption on Android and iOSFourth in a series comparing the cryptographic programming interfaces of Android and iOS.Jul 14, 2021Jul 14, 2021
Jim HawkinsinVMware 360Differences Between Text Encryption on Android and iOSThird in a series comparing the cryptographic programming interfaces of Android and iOS.Mar 11, 20211Mar 11, 20211
Jim HawkinsinVMware 360Differences between RSA key generation on Android and iOSFirst in a series comparing the cryptographic programming interfaces for Android and iOS.Nov 16, 20201Nov 16, 20201
Jim HawkinsinVMware 360Differences Between AES Key Generation on Android and iOSSecond in a series comparing the cryptographic programming interfaces of Android and iOS.Nov 16, 20202Nov 16, 20202
Jim HawkinsinVMware 360Error Messages for Enterprise Mobile Applications — part oneFirst in a short series about how to write good error messages for enterprise mobile applications.Apr 20, 2020Apr 20, 2020