DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Recovery codes… Or just one recovery code?

Recovery codes… Or just one recovery code?

Comments
2 min read
A Product Page Erased $285 Billion. Here's What the Audit Trail Should Have Captured.

A Product Page Erased $285 Billion. Here's What the Audit Trail Should Have Captured.

1
Comments
8 min read
Building a Cryptographic Flight Recorder for Algorithmic Trading: VCP v1.1 Deep Dive with Python, TypeScript, and MQL5

Building a Cryptographic Flight Recorder for Algorithmic Trading: VCP v1.1 Deep Dive with Python, TypeScript, and MQL5

1
Comments
29 min read
VeraSnap Building a Cryptographic Evidence Capture App for Android with Kotlin, CameraX, and Hardware-Backed Security

VeraSnap Building a Cryptographic Evidence Capture App for Android with Kotlin, CameraX, and Hardware-Backed Security

Comments
13 min read
VCP v1.1: Building Cryptographic Audit Trails for AI Trading Systems After the 2026 Silver Crash

VCP v1.1: Building Cryptographic Audit Trails for AI Trading Systems After the 2026 Silver Crash

Comments
20 min read
VCP-RISK: Building Cryptographically Verifiable Risk Management Audit Trails for Algorithmic Trading

VCP-RISK: Building Cryptographically Verifiable Risk Management Audit Trails for Algorithmic Trading

Comments
27 min read
The $255M Wake-Up Call: How Cryptographic Audit Trails Could Have Caught a Quant Fund Fraud in Minutes, Not Years

The $255M Wake-Up Call: How Cryptographic Audit Trails Could Have Caught a Quant Fund Fraud in Minutes, Not Years

Comments
18 min read
Building AI's Flight Recorder: A Developer's Response to the Doomsday Clock

Building AI's Flight Recorder: A Developer's Response to the Doomsday Clock

Comments
13 min read
Proving What AI Didn't Generate: Building Cryptographic Refusal Logs with CAP-SRP

Proving What AI Didn't Generate: Building Cryptographic Refusal Logs with CAP-SRP

1
Comments
14 min read
Building Deepfake-Resistant Hiring Systems: Cryptographic Audit Trails as Defense Against Nation-State Identity Fraud

Building Deepfake-Resistant Hiring Systems: Cryptographic Audit Trails as Defense Against Nation-State Identity Fraud

Comments
14 min read
Building Tamper-Proof Media Apps: C2PA vs CPP Deep Dive for Developers

Building Tamper-Proof Media Apps: C2PA vs CPP Deep Dive for Developers

Comments
12 min read
Building Tamper-Evident Audit Trails for Trading Systems: A Complete VCP v1.1 Implementation Guide

Building Tamper-Evident Audit Trails for Trading Systems: A Complete VCP v1.1 Implementation Guide

Comments
24 min read
VCP v1.1: Cryptographic Audit Trails for AI Trading Systems (EU AI Act Ready)

VCP v1.1: Cryptographic Audit Trails for AI Trading Systems (EU AI Act Ready)

1
Comments
10 min read
YAKMESH™ v2.5.0 - Post-Quantum P2P Mesh Network

YAKMESH™ v2.5.0 - Post-Quantum P2P Mesh Network

Comments
1 min read
Building a Camera That Cannot Lie: How VeriCapture's CPP Implementation Advances Verifiable Provenance

Building a Camera That Cannot Lie: How VeriCapture's CPP Implementation Advances Verifiable Provenance

Comments
7 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.