Stof

Stof

Apr
22
Sentinel: Hackers Trail | Chapter teasers

Sentinel: Hackers Trail | Chapter teasers

Every chapter of the book includes a Limerick, Naani Poem, Quatrain, or Proverb - at the start, can you decipher the story from them?
4 min read
Oct
23
Understanding Digital Signatures: More Than Just a Hash

Understanding Digital Signatures: More Than Just a Hash

Digital signatures are a cornerstone of modern security practices, ensuring data integrity and authentication in various online communications. But there&
6 min read
Oct
04
Why PASETO Might Not Be the JWT Replacement We Hoped For

Why PASETO Might Not Be the JWT Replacement We Hoped For

PASETO, a potential alternative to JWT, has sparked conversations within the security and developer community alike (for once). While PASETO
3 min read
Sep
05
Unveiling the Myths of Multi-Factor Authentication

Unveiling the Myths of Multi-Factor Authentication

MFA refresher Multi-Factor Authentication (MFA) is a security practice that requires users to provide two or more distinct authentication factors
9 min read
Sep
01
Unlocking Your Tech Success - 5 Essential Lessons

Unlocking Your Tech Success - 5 Essential Lessons

Ever wondered what it takes to thrive in the tech world, not just as a coder but as a tech-savvy
2 min read
Aug
24
Forget DevSecOps and ShiftLeft

Forget DevSecOps and ShiftLeft

🪄Integrating Security Seamlessly In this article, we're about to spill the beans on why this approach rocks, answer
4 min read
May
31
Hawk Authentication bug - Firefox Accounts payload bypassing integrity validation

Hawk Authentication bug - Firefox Accounts payload bypassing integrity validation

HawkAuth protocol is widely adopted by Firefox Accounts and appears in Postman in a very short list of supported API
9 min read
May
25

The Imperative of Persistent CSRF Tokens (Video)

A brief on Cross-Site Request Forgery Cross-Site Request Forgery (CSRF) attacks, capable of duping a user into performing an unintended
5 min read
Apr
06

JWT: A Cryptographic Love Story with Security, Vulnerabilities, and a State of Confusion

Folks, remember to be careful with your JWTs. Use strong cryptographic algorithms, manage those secret keys like they're
15 min read
Aug
01

Certificate Pinning is powerful, but you probably shouldn't use it

Let's be clear about Certificate Pinning. It IS extremely useful. It IS valid, if you follow 1 rule,
1 min read