Photo by Alex Motoc on Unsplash

The Wonderful World of Hashing … Some Biba, Entropy Calculations, and Virtually Every Hashing Method Under The Sun

At the core of cybersecurity is … trust. This can be human trust within a system, such as seeing that there’s a green bar on an HTTPs URL, or that a user is reassured by fingerprint recognition on their banking app. But human trust is only part of it, as we need digital trust. For this, we need to…

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store