HMAC Verification Tokens
In this post, we explore sending a secure message to a user that doesn’t have an account on your system and therefore cannot be authenticated. We’ll explore the use of HMAC verification tokens that you can email to a recipient …
Nov 6, 2024Data Access Controls for Generative AI
Anyone who has worked on a POSIX system is used to fine-grained data access rights for files and directories. In a world of generative AI, do we need a new permissions model for files used to train LLMs and serve live inferences?
Aug 26, 2024Introducing Whisper
Imagine you have a new engineer joining your team and you need to provide passwords for access to critical systems. Or you need to send a sensitive file to a client. Or you need to share encryption keys with a team member. What do you do?
Oct 1, 2021Using Google's Secret Manager API with Go
Security is by definition an inconvenience. At the very least, it’s about making access to data as challenging as possible for the baddies, conveniently measured in computation time. But good security also requires us good folks to go …
Jun 1, 2021
- 1
- of
- 1