Hashing vs Encoding vs Encrypting vs Signing
On the surface, everyone knows the difference between hashing, encoding, and encrypting. We all know the tradeoffs between them and…
Keith Casey's Corner of the Internet
On the surface, everyone knows the difference between hashing, encoding, and encrypting. We all know the tradeoffs between them and…
TLDR: After Scott Adams died on January 13, 2026, I decided to restore his blog having no clue what I…
Everyone is either offended or excited about “vibe coding.” It’s all the rage and going to solve all your problems,…
After college, I resolved to read one book a month. It can be fiction, non-fiction, technical, business-oriented, or whatever as the…
Disclosure: I’m not involved in 4chan in any way but I have deep fear appreciation for the weaponized autists. What…
SaaS startups live and die by their ability to iterate. Every feature launch, bug fix, or product tweak hinges on…
Through many years of working with APIs, I’ve always been struck by the fundamental problems of SDKs. Most are not…
This was originally published on the Pangea Cyber blog on 14 January 2025. As we’ve worked with customers evaluating Large…
After college, I resolved to read one book a month. It can be fiction, non-fiction, technical, business-oriented, or whatever as the…
This was originally published on the Pangea Cyber blog on 07 January 2025. Designing authorization is fundamentally a challenge. Not…