Verifying randomness in PHP [Part 1]
·
How random is PHP’s random_int() function really?
·
How random is PHP’s random_int() function really?
·
Encryption, encoding, and hashing are three related but distinct concepts. It’s important for you to understand all three.
·
I taught myself 3D modeling so I could print and cast a bracket for my son’s bed out of epoxy. It was a hugely rewarding journey!
·
There are three types of encryption every developer should know: symmetric, asymmetric, and envelope (which is a combination of the previous two).
·
Secret sharing typically requires a trusted third party to communicate a secret from point A to B. Encrypting those secrets at point A and only allowing point B to decrypt them removes any risk in the transfer.
·
A solid blog starts with a solid foundation – in this case WordPress and the tech stack that powers it.
·
In part 5 of our Bitcoin series, we leverage Hashtopolis to distribute a cracking operation across multiple independent machines.
·
If like last week simply guessing a password is insufficient, then you can bring out the big guns. I’m talking about Hashcat, and advanced system that allows you to automate the cracking of passwords using optimized GPU code. Rather than manually guessing one password at a time – or even iterating over one password at
·
Last week we covered the basics of how Bitcoin keys work and how software like Bitcoin Core can protect a private key with a user-defined password. Assume you’ve set up your wallet, set a password, then left things along for long enough to forget your password. Now Bitcoin has exploded in value and you want
·
Last time, I explained the backstory for why I’m treading down this bizarro path in the first place. If I can’t find my Bitcoin and it’s nearly impossible to turn a profit from mining as a hobby, I’ll try to buy my way into wealth instead. The very first step forward is to acquire a