DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Code Signing and Sigstore: How Software Supply Chain Integrity Works

Code Signing and Sigstore: How Software Supply Chain Integrity Works

Comments
6 min read
Show dev.to: I launched Quldra - a post-quantum, single-device Signal alternative

Show dev.to: I launched Quldra - a post-quantum, single-device Signal alternative

1
Comments
5 min read
Matrix: The Open Protocol for Federated Encrypted Messaging

Matrix: The Open Protocol for Federated Encrypted Messaging

Comments
6 min read
Cold Boot Attacks: Why Disk Encryption Doesn't Protect a Running Computer

Cold Boot Attacks: Why Disk Encryption Doesn't Protect a Running Computer

Comments
4 min read
Building an Experimental TypeScript Cipher Inspired by 8 Dimensions

Building an Experimental TypeScript Cipher Inspired by 8 Dimensions

Comments
8 min read
Post-Quantum Cryptography: What Happens to Your Encrypted Data When Quantum Arrives

Post-Quantum Cryptography: What Happens to Your Encrypted Data When Quantum Arrives

Comments
5 min read
MD5 is broken - here is what to use instead

MD5 is broken - here is what to use instead

Comments
3 min read
Reproducible Builds: The Only Way to Verify Your Software Wasn't Tampered With

Reproducible Builds: The Only Way to Verify Your Software Wasn't Tampered With

Comments
5 min read
Secure-by-Design PQC: Why Kyber Ephemeral Keys Demand Linear Types

Secure-by-Design PQC: Why Kyber Ephemeral Keys Demand Linear Types

Comments
5 min read
How to scan your codebase for post-quantum cryptographic risk

How to scan your codebase for post-quantum cryptographic risk

Comments
3 min read
How Password Managers Actually Protect Your Data

How Password Managers Actually Protect Your Data

Comments
5 min read
Supply Chain Attacks: When Your Privacy Tool Gets Compromised

Supply Chain Attacks: When Your Privacy Tool Gets Compromised

Comments
4 min read
The Counter Galois Onion (CGO) Migration: Tor's Cryptographic Engine Swap

The Counter Galois Onion (CGO) Migration: Tor's Cryptographic Engine Swap

1
Comments
1 min read
Why ECDSA Keys Are a Liability in 2026

Why ECDSA Keys Are a Liability in 2026

Comments
10 min read
How Group Encrypted Messaging Actually Works

How Group Encrypted Messaging Actually Works

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.