DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Delivering E2EE media without blowing up Postgres

Delivering E2EE media without blowing up Postgres

Comments
6 min read
Supply Chain Attacks: When Your Privacy Tool Gets Compromised

Supply Chain Attacks: When Your Privacy Tool Gets Compromised

Comments
4 min read
The Counter Galois Onion (CGO) Migration: Tor's Cryptographic Engine Swap

The Counter Galois Onion (CGO) Migration: Tor's Cryptographic Engine Swap

1
Comments
1 min read
Why ECDSA Keys Are a Liability in 2026

Why ECDSA Keys Are a Liability in 2026

Comments
10 min read
How Group Encrypted Messaging Actually Works

How Group Encrypted Messaging Actually Works

Comments
4 min read
Why I built Mickai: sovereignty is a title deed, the cloud is a rental agreement

Why I built Mickai: sovereignty is a title deed, the cloud is a rental agreement

Comments
3 min read
Device distinct messaging: why I killed multi-device and how fingerprint hashing enforces it.

Device distinct messaging: why I killed multi-device and how fingerprint hashing enforces it.

1
Comments
5 min read
The Quantum Threat Is Real — Meet QSafe PQC, a Post-Quantum Cryptography API (And We Need Beta Testers!)

The Quantum Threat Is Real — Meet QSafe PQC, a Post-Quantum Cryptography API (And We Need Beta Testers!)

Comments
6 min read
TOTP, SMS, Hardware Keys, and Passkeys: An Honest 2FA Comparison

TOTP, SMS, Hardware Keys, and Passkeys: An Honest 2FA Comparison

Comments
4 min read
SPF, DKIM, and DMARC: What Email Authentication Actually Does

SPF, DKIM, and DMARC: What Email Authentication Actually Does

Comments
5 min read
My road to ML-KEM-768 over X25519 for my messaging app

My road to ML-KEM-768 over X25519 for my messaging app

2
Comments 3
5 min read
My road to ML-KEM-768 over X25519 for my messaging app

My road to ML-KEM-768 over X25519 for my messaging app

Comments
5 min read
Key Transparency: The Missing Layer That Makes E2E Encryption Trustworthy

Key Transparency: The Missing Layer That Makes E2E Encryption Trustworthy

Comments
5 min read
Forward Secrecy Explained: Why a Data Breach Won't Expose Your Old Messages

Forward Secrecy Explained: Why a Data Breach Won't Expose Your Old Messages

Comments
5 min read
What is Post-Quantum Cryptography?

What is Post-Quantum Cryptography?

Comments
11 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.