Security by obscurity
·
The weakest form of security is that obtained through obscurity – hiding what would otherwise be plainly found in hopes it’ll be missed.
·
The weakest form of security is that obtained through obscurity – hiding what would otherwise be plainly found in hopes it’ll be missed.
·
There is value in every coding discipline, but repetition and practice should have a particular emphasis.
·
I will always support a consumer’s right to repair the things they own. It’s cheaper, sustainable, and far more rewarding than replacement.
·
What’s the largest mistake you’ve made in your career? Did you hold yourself accountable for it? What did you learn through the experience?
·
How do you communicate securely over an insecure medium? Using the Diffie-Hellman key exchange to agree on an encryption key is a start!
·
Everyone experiences fear, especially creatives like developers. Overcoming that fear to ship an imperfect 1.0 is the only way we learn.
·
After using WordPress’ new editor for a month, here are some of the pros and cons I see as a writer using the platform.
·
Expert cryptographers will warn you to never roll your own algorithms. Well, they’re wrong and here are three reasons why.
·
The Vigenere cipher is more complicated that the Caesar cipher but based on the same idea. It uses a running key to keep your message secure.
·
Anyone studying cryptography needs to understand various forms of ciphers. Today, we’ll look at three that you should know well.