HMAC Verification Tokens
In this post, we explore sending a secure message to a user that doesn’t have an account on your system and therefore cannot be authenticated. We’ll explore the use of HMAC verification tokens that you can email to a recipient …
Nov 6, 2024Compression vs Cryptography: What Comes First?
Data encryption and compression are heavyweight algorithms that must be used with care in performance intensive applications; but when applying both mechanics to the same data, which should come first?
Oct 31, 2023
- 1
- of
- 1