tag: 'cryptography: key challenges'

Narrow your search:

    Log in Sign up
    2 Matching Annotations
    1. Nov 2022
    2. developer.okta.com developer.okta.com
      Implement the OAuth 2.0 Authorization Code with PKCE Flow
      1
      1. TylerRick 20 Nov 2022
        in Public
        This is an effective, dynamic stand-in for a fixed secret.

        run-time dynamicness vs. hard-coded values hard-coded values = fixed secret

        run-time dynamicness vs. hard-coded values stand-in cryptography cryptography: key challenges
      Visit annotations in context

      Tags

      • stand-in
      • cryptography
      • run-time dynamicness vs. hard-coded values
      • cryptography: key challenges

      Annotators

      • TylerRick

      URL

      developer.okta.com/blog/2019/08/22/okta-authjs-pkce
    3. Dec 2019
    4. unixwiz.net unixwiz.net
      An Illustrated Guide to SSH Agent Forwarding
      1
      1. TylerRick 13 Dec 2019
        in Public
        One of the more clever aspects of the agent is how it can verify a user's identity (or more precisely, possession of a private key) without revealing that private key to anybody.
        cryptography cryptography: key challenges how things work
      Visit annotations in context

      Tags

      • cryptography: key challenges
      • cryptography
      • how things work

      Annotators

      • TylerRick

      URL

      unixwiz.net/techtips/ssh-agent-forwarding.html
    Share:
    Group. Only group members will be able to view this annotation.
    Only me. No one else will be able to view this annotation.
    Hypothes.is
    • About
    • Blog
    • Bioscience
    • Education
    • Jobs
    • Help
    • Contact
    • Terms of Service
    • Privacy Policy