How To Build JWT’s in Go (Golang)

By Lane Wagner – @wagslane on Twitter Go is becoming very popular for backend web development, and JWT’s are one of the most popular ways to handle authentication on API requests. In this article, we are going to go over the basics of JWT’s and how to implement a secure authentication strategy in Go! What is a … Read more How To Build JWT’s in Go (Golang)

How Do Brute-Force Attackers Know They Found The Key?

By Lane Wagner – @wagslane on Twitter Brute force attackers guess passwords, passphrases, and private keys in an attempt to eventually get the right answer and crack the security of a system, but how do they know when they have the right key? It depends on the system. Let’s answer the question three times, one for three … Read more How Do Brute-Force Attackers Know They Found The Key?

AES-256 Cipher – Python Cryptography Examples

By Lane Wagner – @wagslane on Twitter Need to encrypt some text with a password or private key in Python? You certainly came to the right place. AES-256 is a solid symmetric cipher that is commonly used to encrypt data for oneself. In other words, the same person who is encrypting the data is typically decrypting it … Read more AES-256 Cipher – Python Cryptography Examples

How To Cache Images – React Native Expo (Managed)

By Lane Wagner – @wagslane on Twitter Caching images in React Native can be easy, even if you are using Expo’s managed workflow. The problem many devs run into is that React Native only supports caching images on IOS out of the box. Other popular community packages that work on Android contain native code, and as such … Read more How To Cache Images – React Native Expo (Managed)

JavaScript With Statement Explained – A Deep Dive

By @wagslane (twitter) Let’s look at the JavaScript with statement. We will go over the simple uses, as well as a deep dive into some more advanced concepts. Note: Use of the with statement is discouraged. It can lead to strange bugs. That said, it is important to understand how it works because it may exist in … Read more JavaScript With Statement Explained – A Deep Dive

JavaScript vs Java – Differences, Similarities, and History

By @wagslane (twitter) Java and JavaScript confuse many new programmers. They sound so similar, so one might think they have the same use-cases, or maybe the same company created both languages. Neither of those assumptions is true! Let’s go over the differences and history in this quick read. Java – Brief History In 1991, James Gosling of … Read more JavaScript vs Java – Differences, Similarities, and History

JavaScript Map Function Explained – A Deep Dive

We are going to walk through the JavaScript map function. I’ll explain how it works in a simple way. Later in the article, we will do a deep dive into some more advanced concepts regarding the map function and its uses. Map Function Syntax From Mozilla’s definition: The Array object’s map method takes a function … Read more JavaScript Map Function Explained – A Deep Dive

Logging for Gophers – Idiomatic Log Strategies in Go (Golang)

guest writing on table

In this article, I’m going to cover some rules of thumb for logging in go, as well as some functions you may not have heard of that can make your debugging life easier. Rule #1 – Use Errors Where Appropriate, Not Strings Go has a built-in error type, which allows developers to easily differentiate errors … Read more Logging for Gophers – Idiomatic Log Strategies in Go (Golang)

(Very) Basic Shamir’s Secret Sharing

By @wagslane (twitter) We use an algorithm called Adi Shamir’s secret sharing in order to share ownership of a secret among a group of participants. Then, in order to calculate the original secret, a minimum number of shares must be used. Example Problem To illustrate, let us imagine that a family of four shares a … Read more (Very) Basic Shamir’s Secret Sharing

HMAC and MAC Explained Simply – Building Secure Auth With JWTs

HMACs and MACs are authentication codes and are often the backbone of JWT authentication systems. Let’s take a look at how they work! MAC – Message Authentication Code MACs are exactly what they sound like; small codes that allow receivers of messages to know who the sender was (authentication). A MAC code is calculated by … Read more HMAC and MAC Explained Simply – Building Secure Auth With JWTs