The main idea is to use the same approach as in my previous post, but instead of using a simple hash function for hashing the data, I will use a cryptographic hash function.

The advantage of this approach is that it allows me to check if two pieces of data are identical or not without actually having to store them both. This means that I can avoid storing duplicate copies ...

Continue Reading
API security is a business imperative.

The API economy is growing at an unprecedented pace, and organizations are increasingly relying on APIs to drive innovation https://t.co/Eg46lu5tzq ...

Continue Reading
Attackers can exploit API endpoints vulnerable to broken object level authorization by using the same data attributes that are used in web applications.

The following example shows how an attacker could use a stolen user’s ID and password to access their bank account:  A malicious user steals a valid user’s credentials from a compromised website, ...

Continue Reading
API keys are passwords.

Treat them accordingly. 3. Require Transport Layer Security for All API Traffic While the use of HTTPS is a good first step, it’s not enough to protect all API traffic from eavesdropping and man-in ...

Continue Reading
I’m a software engineer at Google, and I wrote a book about Go.

I've been working on the Go team since before 1.0 shipped in March 2012. In that time we've released many new versions of the language, libraries, and tools; grown from a few dozen to hundreds of cont ...

Continue Reading
The best way to get started is to use the official Docker image.

It's easy and quick, but it doesn't give you much control over your environment. If you want more control, build from source or use a pre-built binary for your platform of choice (Linux/OSX only). If ...

Continue Reading
The most important thing to remember is that you are not a bad person for having these thoughts.

You’re human, and it’s natural to have them. The second most important thing is that your feelings of guilt or shame about those thoughts don’t help anyone – least of all the people who love you h ...

Continue Reading
OAuth 2.

0 is still the most popular authorization protocol, but it has a number of limitations that are being addressed by OAuth 3.0 and OpenID Connect (OIDC). The main problem with OAuth 2.0 is that it does ...

Continue Reading

Back to Main

Subscribe for the latest news: