Tags
#Security
Content tagged with "Security".
- BlogEncrypting a Byte Stream in the Browser with Web Crypto
Web Crypto gives you strong primitives but no stream interface. This post shows how to encrypt ReadableStream<Uint8Array> using the encryption subpath of @hsblabs/web-stream-extras — covering file encryption, per-stream key management, and pipeline composition.
- GlossaryEnvelope Encryption
Envelope encryption uses a two-layer model: data is encrypted by a DEK, and the DEK itself is encrypted by a KEK.
- GlossaryIDOR (Insecure Direct Object Reference)
IDOR is a vulnerability where direct object identifiers allow access to resources without proper authorization checks.
- GlossarySAPISIDHASH
SAPISIDHASH is an authentication-related hash used by some internal Google APIs to validate request context.
- GlossaryTamper Resistance
Tamper resistance is a design property that prevents or makes tampering attempts significantly harder.
- GlossaryTampering
Tampering is unauthorized modification, analysis, or extraction against systems, software, or data.
hsb.horse