josh lake

Josh Lake

Josh Lake is a writer who focuses on the intersections between technology, privacy and security. His work helps companies and individuals get the most out of technological developments, without having to sacrifice their civil liberties or open themselves up to the ever-increasing threats of cybercrime.

Articles by Josh

Key derivation functions (KDFs) play a vital role in our security. They help us create strong keys, allow us to store passwords and more.
By Josh Lake in Information Security on September 12, 2023
Fernet makes it easy for Python developers to implement encryption and authentication into their applications.
By Josh Lake in Information Security on September 5, 2023
If a preimage attack is possible against the cryptographic hash functions we use, it could completely undermine our online security.
By Josh Lake in Information Security on October 27, 2023
Websites and apps use dark patterns to manipulate us into taking actions that we may not want to take. Find out how they violate our privacy.
By Josh Lake in Information Security on June 14, 2022
Collision attacks threaten the security of cryptographic hash functions, which form critical parts of our cybersecurity infrastructure. This article covers everything you should know about collision attacks.
By Josh Lake in Information Security on September 13, 2023
SHA-2 is a hash function that plays a critical role in much of our online security. Find out what it is, where it's used and how it works.
By Josh Lake in Information Security on February 17, 2022
The SHA-2 algorithm is a key component of your everyday online security. Find out how SHA-256 and its related algorithms work in our guide.
By Josh Lake in Information Security on December 13, 2023
3DES used to be one of the most prominent forms of encryption. It is based on the DES algorithm, but has since been superseded by AES in most use cases.
By Josh Lake in Information Security on August 31, 2023
Integer overflow attacks exploit coding flaws and can have serious consequences. Learn about integer overflow attack examples in our guide.
By Josh Lake in Information Security on September 11, 2023
Page 1 of 6
126