Debating a three part crypto series:
1. Symmetric crypto with block ciphers
2. Asymmetric crypto
3. Stream ciphers

Will keep it relatively simple. Goal is to explain how the paradigms work, with roll-your-own implementation code, and SUPER STRONG WARNINGS TO NEVER DIY.

Thoughts?

Follow

My goal is to help devs understand what's going on under the hood so they've got a better idea of what's happening when they use safe, standard tools like Libsodium.

Sign in to participate in the conversation
Mastodon

Invite-only community of developers, builders, makers, and tektons.