Eric Mann's Blog

  • Writing
  • Cryptopals: Set 1 – challenge 1
    February 15, 2022

    Cryptopals: Set 1 – challenge 1

    Challenge 1 in the cryptopals suite is to juggle between Base64 and Hex encoding of byte strings. Let’s do just that, with value objects!

    Security, Technology
  • The Cryptopals challenges
    February 14, 2022

    The Cryptopals challenges

    Starting today I kick off a series on the cryptopals crypto challenges, with my implementations in PHP. Feel free to join in the fun!

    Security, Technology
  • One perspective on career stages
    February 13, 2022

    One perspective on career stages

    Different people see career progression from their own angles. I’ve encountered one that makes sense, tho I don’t so much see it as a progression.

    Business
  • Do the dishes – right now
    February 12, 2022

    Do the dishes – right now

    Refactoring legacy code is like cleaning the dishes. Someone has to do it – hopefully before the stack of moldering waste falls on the floor.

    Technology
  • The value of encryption
    February 11, 2022

    The value of encryption

    I care very deeply about privacy, which translates to a passion for encryption and cryptography. You should care about privacy, too.

    Security
  • Technology cost analysis
    February 10, 2022

    Technology cost analysis

    Cost analysis can be a tricky exercise in the technology space as not all costs are readily apparent during price shopping.

    Business, Technology
  • Establishing trust in business
    February 9, 2022

    Establishing trust in business

    Sometimes the best way to make a sale is to stop selling and focus instead on building a relationship and establishing trust.

    Business
  • Information leakage and side channel attacks
    February 8, 2022

    Information leakage and side channel attacks

    Side channel attacks are one of the many cryptographic footguns we need to avoid while designing and building secure applications.

    Security
  • Security by obscurity
    February 7, 2022

    Security by obscurity

    The weakest form of security is that obtained through obscurity – hiding what would otherwise be plainly found in hopes it’ll be missed.

    Security
  • The value of repetition
    February 6, 2022

    The value of repetition

    There is value in every coding discipline, but repetition and practice should have a particular emphasis.

    Technology
Previous Page Next Page

© 2026

Eric Mann's Blog

·

Powder Theme by Brian Gardner

  • X
  • LinkedIn
  • Mastodon