Articles by Josh
Key derivation functions (KDFs) play a vital role in our security. They help us create strong keys, allow us to store passwords and more.
Fernet makes it easy for Python developers to implement encryption and authentication into their applications.
Single sign-on can make life easier for users and help to boost an organization's overall security. We reveal the pros and cons of single sign-on and whether you should use it.
If a preimage attack is possible against the cryptographic hash functions we use, it could completely undermine our online security.
Websites and apps use dark patterns to manipulate us into taking actions that we may not want to take. Find out how they violate our privacy.
Collision attacks threaten the security of cryptographic hash functions, which form critical parts of our cybersecurity infrastructure. This article covers everything you should know about collision attacks.
Password cracking is one of the tools that hackers turn to when they can't gain access to an account by other means. Find out how they do it.
SHA-2 is a hash function that plays a critical role in much of our online security. Find out what it is, where it's used and how it works.