9 questions
When I was looking at Twitter, I saw a tweet like thisIn principle, E2EE is very difficult for users to verify whether key exchange is done in a reliable way, media content is often not encrypted (une...
I'm asking you because I'm curious about how to use it in practice.try: cursor.execute(create table test( id serial primary key, plainData varchar(10), cihperData varchar(255), nonce varchar(255) ))...
I'm making an app. When I log in to the server, I use the user's name and password, but it's annoying to enter the password every time, so I made a password as an option.I tried to use SharedPreferenc...
In the case of Naver Web document, if you click View Source in Chrome, you can see the source layer as follows. Of course, I don't know the whole context, but I was able to see how it was organized ro...
I'm trying to create a notepad app using Firebase DB, but when I used it, I could see other people's data and storage pictures without data encryption.In Firebase, it is considered that security suppo...
Hi, everyone.I'm still a student.I'm interested in implementing encryption these days.I thought about implementing bidirectional encryption with JCA.First, every communication, the server sends the pu...
Please tell me the normal encryption module that I can use on Python 3The hashlib module doesn't seem to work properly It doesn't matter what encryption method it isHowever, it would be nice if the en...
I'm going to use API on Bithumb, a cryptocurrency exchange.There are many things I don't know because I'm still a beginner, so I'm looking around to find out what functions work, but there are parts t...
Hi, everyone.Internet packet encryption was implemented with your help.Thank you.But I'm curious about how to encrypt the server.Assuming that public-private key encryption is carried out, should the ...
© 2024 OneMinuteCode. All rights reserved.