Security in Dependencies

photo 1495145910046 717b12bffcf7

Choosing the right dependencies is a difficult task. Assuming the developer of an application is the best programmer in the world, the “best” thing to do would be to write the entire codebase alone. This would eliminate the bugs, vulnerabilities, and malicious intrusions of inferior developers. The trouble is that we like to move quickly … Read more

Stop with the Obfuscation: Encoding and Encryption are Not the Same


This is a topic that has been talked about quite a bit, but I think it’s an important one to reiterate to our users. Encoding is not Encryption! Encryption is a specific subset of encoding where the encoded messages can only be accessed by authorized parties (the ones holding the decryption keys). Encoding is simply … Read more

You Can’t Function in 2019 Without a Password Manager

Password Feature art

Secrets. You certainly have many and I don’t mean stretching the truth to a first date about interests and hobbies or being into My Little Pony as a forty-year-old man. I’m talking about digital secrets. Social security numbers, passwords, pin codes, cryptocurrency keys, credit cards, and bank account numbers, for instance, define our online personas … Read more