Tagged articles
10 articles
Page 1 of 1
Top Architect
Top Architect
Dec 7, 2025 · Information Security

Designing Secure API Encryption with HTTPS and WeChat Pay Principles

This article outlines a comprehensive API security solution that combines symmetric and asymmetric encryption, HTTPS fundamentals, and WeChat Pay cryptographic practices, detailing design, implementation, key management, parameter handling, backend processing, and security analysis to protect against tampering, replay, and crawling.

API SecurityWeChat Paydigital signatures
0 likes · 14 min read
Designing Secure API Encryption with HTTPS and WeChat Pay Principles
Chen Tian Universe
Chen Tian Universe
Aug 25, 2025 · Information Security

Master Payment Security: Proven 20-Year Methods to Stop Leaks, Tampering & Fraud

Payment security encompasses protecting sensitive data, preventing transaction tampering, fraud, and service attacks; this comprehensive guide details the main threats, core safeguards such as encrypted storage and transmission, digital signatures, PCI compliance, key management, and practical encryption algorithms like AES and RSA for robust, real‑world implementations.

PCI compliancedigital signaturesencryption
0 likes · 50 min read
Master Payment Security: Proven 20-Year Methods to Stop Leaks, Tampering & Fraud
Code Mala Tang
Code Mala Tang
Jun 14, 2024 · Information Security

Why and How to Sign Your Electron App: Boost Security with Code Signing

Code signing verifies software authenticity and integrity, preventing tampering and security warnings, and this guide explains what code signing is, its types, applicable file formats, certificate options, and step‑by‑step instructions—including Electron‑builder configuration and sample scripts—to help developers secure their desktop applications.

Code SigningEV certificateElectron
0 likes · 9 min read
Why and How to Sign Your Electron App: Boost Security with Code Signing
MaGe Linux Operations
MaGe Linux Operations
Sep 27, 2022 · Information Security

Understanding Network Security: Threats, Encryption, and Defense Mechanisms

This article provides a comprehensive overview of network security, covering passive and active threats, cryptographic models, digital signatures, authentication methods, key distribution, firewalls, and intrusion detection systems, highlighting essential concepts and practical defenses.

Firewallscryptographydigital signatures
0 likes · 14 min read
Understanding Network Security: Threats, Encryption, and Defense Mechanisms
MaGe Linux Operations
MaGe Linux Operations
May 7, 2022 · Information Security

Cryptography Basics: Symmetric, Asymmetric, Hashing & Digital Signatures

This article introduces fundamental cryptography concepts, explaining how symmetric and asymmetric encryption work, the role of key exchange, the purpose and properties of hashing algorithms, and how digital signatures combine encryption and hashing to ensure data authenticity and integrity.

Hashingcryptographydigital signatures
0 likes · 7 min read
Cryptography Basics: Symmetric, Asymmetric, Hashing & Digital Signatures
Ops Development Stories
Ops Development Stories
Sep 18, 2021 · Information Security

Secure Message Delivery: Symmetric & Asymmetric Encryption, Hashes, Signatures

Learn the fundamentals of information security through a myth-inspired scenario, covering how symmetric and asymmetric encryption, message digests, and digital signatures ensure confidentiality, integrity, and authenticity when transmitting a simple invitation, and explore a practical secure email system design.

Symmetric Cryptographydigital signaturesencryption
0 likes · 7 min read
Secure Message Delivery: Symmetric & Asymmetric Encryption, Hashes, Signatures
21CTO
21CTO
May 17, 2019 · Information Security

Why SHA-1 Is Dead: New Prefix Collision Attack Signals Its End

A recent $100k research effort demonstrated a prefix collision attack on SHA-1, proving that attackers can forge signed documents and TLS certificates, and highlighting why the cryptographic community must retire SHA-1 in favor of stronger hash algorithms.

Hash CollisionSHA-1cryptography
0 likes · 6 min read
Why SHA-1 Is Dead: New Prefix Collision Attack Signals Its End
Senior Brother's Insights
Senior Brother's Insights
Jul 30, 2018 · Blockchain

Why Blockchain Matters: From Hash Functions to Decentralized Ledgers

The article explains how blockchain, introduced by Satoshi Nakamoto in 2008, uses cryptographic hash functions, Merkle trees, proof‑of‑work, and digital signatures to create an immutable, trust‑minimized ledger, compares naïve and validated coin models, and contrasts public versus private blockchains while forecasting massive future growth.

DecentralizationMerkle TreeProof of Work
0 likes · 23 min read
Why Blockchain Matters: From Hash Functions to Decentralized Ledgers