Enthusiastic Security Engineer.
This post covers an overview on how the OAuth 2.0 protocol works and a practical example in golang in order to apply and…
This blog post exemplifies and covers how a password storage should (or shouldn’t) be…
Couple of days ago Alice, a friend of mine, called me and showed me the following email that she received…