• Application of Bitcoin in the field of data security (1)


    Have you ever encountered such a scenario, the company needs to configure an internal service, and for the convenience of debugging, a public network interface is exposed. At the same time, in order to ensure security, token verification is set for this interface. Only members of the group know this token. Obviously, there is a […]

  • Can video encryption be automatically destroyed after expiration?


    In our impression, the text on the book has always existed, but there is also a kind of book in order to limit the viewing time and solve the problem of procrastination, and the text on the book disappears within a certain period of time. As early as 1992, the American science fiction master William […]

  • Smart Contract Security – Overflow Vulnerabilities


    Arithmetic overflow, or overflow for short, comes in two flavors: overflow and underflow. The so-called overflow means that when running a single numerical calculation, when the result of the calculation is very large, it will overflow when it is larger than the limit of the capacity that the register or memory can store or represent; […]

  • Leaving the back-end to say that the front-end encryption is empty talk


    Recently, a friend is working hard on how to protect user password security without using HTTPS. Let’s not talk about the research process for now, but the conclusion is that to ensure security, the back-end must participate and use an asymmetric encryption algorithm-in this way, it is simpler, more convenient and more secure than using […]

  • Is MD5 an encryption algorithm?


    foreword MD5 is a very commonly used algorithm in program development, and many people have used it. One of the most commonly used scenarios of the MD5 algorithm is user registration, and the password is encrypted with MD5. The password cannot be reversely decrypted to improve security. But is MD5 really encryption? What exactly do […]

  • Smart Contract Security – Reentrancy Vulnerabilities


    I believe everyone has heard of reentrancy vulnerabilities, so what is a reentrancy vulnerability?As we all know, the transfer of Ethereum can not only be carried out between wallet addresses, but also between contracts and wallet addresses, and between contracts. When the contract receives the transfer, it will trigger the fallback function to execute the […]

  • Briefly talk about the security issues of C language data type conversion


    In the assignment type conversion of C language, there are two conversion methods, which are divided into implicit conversion and explicit conversion. What is implicit conversion, give a simple demo (of course, the actual encounter must be much more complicated than this) int a = 3; int b = 0; a = b; printf(“%d”, a); […]

  • Play with hybrid encryption


    Data encryption is a technology with a long history. It refers to converting plaintext into ciphertext through encryption algorithm and encryption key, and decryption is to restore ciphertext to plaintext through decryption algorithm and decryption key. At its core is cryptography. Data encryption remains one of the most reliable ways for computer systems to protect […]

  • Generation and use of GPG keys


    I. Introduction Recently, when connecting with banks, the bank requires PGP to encrypt data files. First, we need to generate a key pair. Then export the public key to the other party, and export the private key for subsequent program decryption. Regarding the basic introduction of GPG, I won’t introduce it here. You can just […]

  • 【Transfer】PrivacyIN Privacy Academy | Analysis of the basic cryptographic basis of zero-knowledge proof


    PrivacyIN Privacy Institute (Privacy Institution) is initiated by the LatticeX Foundation, and is committed to building an open cryptography and privacy technology evangelism and research community, and unites the world’s top scholars and privacy technology developers to promote ZK (Zero-Knowledge Proof), MPC (Security The innovation and implementation of multi-party computing) and FHE (full homomorphic encryption). […]

  • Ten questions and ten answers for encrypted storage of user passwords, one article explains the safe storage of passwords


    Author: __Programmer Zhao Xinoriginal:https://www.cnblogs.com/xinzh… The permission management of our database is very strict, and sensitive information development engineers can’t see it. Can’t passwords be stored in plain text? no. The data stored in the database faces many threats, including the application level, database level, operating system level, computer room level, and employee level. It is […]

  • K8S Ecological Weekly | Kubernetes v1.25 will add support for user namespaces


    The content of “K8S Ecological Weekly Report” mainly includes some recommended weekly information related to the K8S ecology that I have come into contact with. Welcome to subscribe to Zhihu column“k8s ecology”。 Hello everyone, I am Zhang Jintao. This week is also a busy week. I would like to share an experience with you, giving […]