Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
encryption
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
I built a zero-knowledge encrypted secrets manager as a solo developer â launching next week
CryptVault
CryptVault
CryptVault
Follow
Mar 29
I built a zero-knowledge encrypted secrets manager as a solo developer â launching next week
#
security
#
webdev
#
encryption
#
javascript
Comments
Add Comment
2 min read
Why I Chose Not to Add Password Reset to an Offline Vault App
Almost Brilliant Ideas
Almost Brilliant Ideas
Almost Brilliant Ideas
Follow
Mar 28
Why I Chose Not to Add Password Reset to an Offline Vault App
#
privacy
#
android
#
encryption
#
security
Comments
Add Comment
4 min read
đď¸ Public/Private Keys Explained Like You're 5
Sreekar Reddy
Sreekar Reddy
Sreekar Reddy
Follow
Mar 25
đď¸ Public/Private Keys Explained Like You're 5
#
eli5
#
security
#
encryption
#
programming
1
 reaction
Comments
1
 comment
1 min read
Ritual Protocol: a key as an action, not an object
Sergey Ovcharenko
Sergey Ovcharenko
Sergey Ovcharenko
Follow
Mar 28
Ritual Protocol: a key as an action, not an object
#
security
#
go
#
encryption
1
 reaction
Comments
Add Comment
2 min read
Hackers Read Your Password Without HTTPS
Neural Download
Neural Download
Neural Download
Follow
Mar 23
Hackers Read Your Password Without HTTPS
#
https
#
tls
#
encryption
#
ssl
Comments
Add Comment
3 min read
Vector Search and Queryable Encryption in .NET: Engineering Secure AI Systems at Scale
Ali Suleyman TOPUZ
Ali Suleyman TOPUZ
Ali Suleyman TOPUZ
Follow
Mar 21
Vector Search and Queryable Encryption in .NET: Engineering Secure AI Systems at Scale
#
search
#
encryption
#
enterprisearchitectu
#
machinelearning
Comments
Add Comment
3 min read
Security by Default: Keeping Code Local with Orquesta
Orquestađ˘
Orquestađ˘
Orquestađ˘
Follow
Mar 21
Security by Default: Keeping Code Local with Orquesta
#
security
#
localexecution
#
encryption
#
audittrails
Comments
Add Comment
3 min read
Lost EncryptionSafe Software: Recovering AES 256-Encrypted Files After Laptop Wipe
Sergey Boyarchuk
Sergey Boyarchuk
Sergey Boyarchuk
Follow
Mar 19
Lost EncryptionSafe Software: Recovering AES 256-Encrypted Files After Laptop Wipe
#
encryption
#
dataloss
#
aes256
#
proprietary
Comments
Add Comment
12 min read
PIN Encryption & Decryption with RSA in Node.js
instanceofGod
instanceofGod
instanceofGod
Follow
Mar 17
PIN Encryption & Decryption with RSA in Node.js
#
security
#
encryption
#
beginners
#
node
Comments
Add Comment
11 min read
Cryptography Fundamentals: How Your Data Stays Secret in 2026
Abhishek Nair
Abhishek Nair
Abhishek Nair
Follow
Mar 15
Cryptography Fundamentals: How Your Data Stays Secret in 2026
#
cryptography
#
encryption
#
security
#
aes
Comments
Add Comment
8 min read
Meta's Default Encryption for Messenger: Why Governments Are Furious and What It Actually Means
Kunal
Kunal
Kunal
Follow
Mar 13
Meta's Default Encryption for Messenger: Why Governments Are Furious and What It Actually Means
#
meta
#
privacy
#
encryption
#
socialmedia
1
 reaction
Comments
Add Comment
7 min read
Building End-to-End Encrypted Agent Conversations with Registry Broker
Michael Kantor
Michael Kantor
Michael Kantor
Follow
Mar 4
Building End-to-End Encrypted Agent Conversations with Registry Broker
#
encryption
#
security
#
registrybroker
#
hcs10
Comments
Add Comment
5 min read
How Zero-Knowledge File Sharing Works: AES-256-GCM in the Browser
FileShot
FileShot
FileShot
Follow
Mar 3
How Zero-Knowledge File Sharing Works: AES-256-GCM in the Browser
#
security
#
encryption
#
privacy
#
webdev
Comments
Add Comment
2 min read
Enhancing Security: Streamlined Solutions for Safely Sharing Sensitive Files Within Teams
Marina Kovalchuk
Marina Kovalchuk
Marina Kovalchuk
Follow
Mar 3
Enhancing Security: Streamlined Solutions for Safely Sharing Sensitive Files Within Teams
#
security
#
encryption
#
workflows
#
friction
Comments
Add Comment
11 min read
Online Code Editors Expose Sensitive Data: Implementing End-to-End Encryption and User Consent as Solutions
Maxim Gerasimov
Maxim Gerasimov
Maxim Gerasimov
Follow
Mar 2
Online Code Editors Expose Sensitive Data: Implementing End-to-End Encryption and User Consent as Solutions
#
security
#
encryption
#
privacy
#
developers
1
 reaction
Comments
Add Comment
7 min read
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account