logo hsb.horse
← Back to tag index

Tags

#Security

Content tagged with "Security".

Entries 6
  1. Blog
    Encrypting a Byte Stream in the Browser with Web Crypto

    Web Crypto gives you strong primitives but no stream interface. This post shows how to encrypt ReadableStream<Uint8Array> using the encryption subpath of @hsblabs/web-stream-extras — covering file encryption, per-stream key management, and pipeline composition.

  2. Glossary
    Envelope Encryption

    Envelope encryption uses a two-layer model: data is encrypted by a DEK, and the DEK itself is encrypted by a KEK.

  3. Glossary
    IDOR (Insecure Direct Object Reference)

    IDOR is a vulnerability where direct object identifiers allow access to resources without proper authorization checks.

  4. Glossary
    SAPISIDHASH

    SAPISIDHASH is an authentication-related hash used by some internal Google APIs to validate request context.

  5. Glossary
    Tamper Resistance

    Tamper resistance is a design property that prevents or makes tampering attempts significantly harder.

  6. Glossary
    Tampering

    Tampering is unauthorized modification, analysis, or extraction against systems, software, or data.