One of the most important properties of a cryptographic hash function is that of “Strong collision-resistance”, that is, it should be "computationally infeasible" to find distinct inputs x1, x2 such… Read more »
I am a happy customer of Ola. I decided to try Uber. I installed the Uber app on my wife’s Android mobile and tried to register with her email address… Read more »
I read an article titled Frequent password changes are the enemy of security which I find misleading and missing the point. In this article, Carnegie Mellon University professor Lorrie Cranor,… Read more »
There is no substitute for detailed code reviews, more so if the code is related to security. Any changes to such code, however minor, should be reviewed. However, in addition,… Read more »