Forem

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to scan your codebase for post-quantum cryptographic risk
Cover image for How to scan your codebase for post-quantum cryptographic risk

How to scan your codebase for post-quantum cryptographic risk

Comments
3 min read
How Password Managers Actually Protect Your Data

How Password Managers Actually Protect Your Data

Comments
5 min read
Supply Chain Attacks: When Your Privacy Tool Gets Compromised

Supply Chain Attacks: When Your Privacy Tool Gets Compromised

Comments
4 min read
The Counter Galois Onion (CGO) Migration: Tor's Cryptographic Engine Swap
Cover image for The Counter Galois Onion (CGO) Migration: Tor's Cryptographic Engine Swap

The Counter Galois Onion (CGO) Migration: Tor's Cryptographic Engine Swap

1
Comments
1 min read
Why ECDSA Keys Are a Liability in 2026

Why ECDSA Keys Are a Liability in 2026

Comments
10 min read
How Group Encrypted Messaging Actually Works

How Group Encrypted Messaging Actually Works

Comments
4 min read
Device distinct messaging: why I killed multi-device and how fingerprint hashing enforces it.
Cover image for Device distinct messaging: why I killed multi-device and how fingerprint hashing enforces it.

Device distinct messaging: why I killed multi-device and how fingerprint hashing enforces it.

1
Comments
5 min read
The Quantum Threat Is Real — Meet QSafe PQC, a Post-Quantum Cryptography API (And We Need Beta Testers!)

The Quantum Threat Is Real — Meet QSafe PQC, a Post-Quantum Cryptography API (And We Need Beta Testers!)

Comments
6 min read
Delivering E2EE media without blowing up Postgres
Cover image for Delivering E2EE media without blowing up Postgres

Delivering E2EE media without blowing up Postgres

Comments
6 min read
TOTP, SMS, Hardware Keys, and Passkeys: An Honest 2FA Comparison

TOTP, SMS, Hardware Keys, and Passkeys: An Honest 2FA Comparison

Comments
4 min read
SPF, DKIM, and DMARC: What Email Authentication Actually Does

SPF, DKIM, and DMARC: What Email Authentication Actually Does

Comments
5 min read
My road to ML-KEM-768 over X25519 for my messaging app
Cover image for My road to ML-KEM-768 over X25519 for my messaging app

My road to ML-KEM-768 over X25519 for my messaging app

2
Comments 3
5 min read
How We Made STARK Verification 294x Faster

How We Made STARK Verification 294x Faster

Comments
1 min read
My road to ML-KEM-768 over X25519 for my messaging app
Cover image for My road to ML-KEM-768 over X25519 for my messaging app

My road to ML-KEM-768 over X25519 for my messaging app

Comments
5 min read
Key Transparency: The Missing Layer That Makes E2E Encryption Trustworthy

Key Transparency: The Missing Layer That Makes E2E Encryption Trustworthy

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.