Skip to content
Caseysoftware

Caseysoftware

Keith Casey's Corner of the Internet

  • Home
  • AI Development
  • API Design
  • Startup Economics
  • Web2Project
  • My Reading

Category: Uncategorized

Hashing vs Encoding vs Encrypting vs Signing
Uncategorized

Hashing vs Encoding vs Encrypting vs Signing

February 17, 2026February 14, 2026

On the surface, everyone knows the difference between hashing, encoding, and encrypting. We all know the tradeoffs between them and…

Authorization in AI Systems with Pangea Multipass
Uncategorized

Authorization in AI Systems with Pangea Multipass

January 14, 2025May 8, 2026

This was originally published on the Pangea Cyber blog on 14 January 2025. As we’ve worked with customers evaluating Large…

Pangea AuthZ: Inherited Permissions
Uncategorized

Pangea AuthZ: Inherited Permissions

January 7, 2025May 8, 2026

This was originally published on the Pangea Cyber blog on 07 January 2025. Designing authorization is fundamentally a challenge. Not…

O-1s, H-1Bs, and other ways US Immigration is Broken
Uncategorized

O-1s, H-1Bs, and other ways US Immigration is Broken

December 28, 2024November 26, 2025

With the big ongoing debate on immigration, it’s been amazing/horrifying watching people muddle everyone together into one bucket and then…

AuthZ: ABAC == true
Uncategorized

AuthZ: ABAC == true

September 10, 2024May 8, 2026

This was originally published on the Pangea Cyber blog on 10 September 2024. All of access control comes down to…

Protecting our PQL Funnel
Uncategorized

Protecting our PQL Funnel

July 18, 2024May 8, 2026

Using passive signals to block bots, spammers, and bad actors This was originally published on the Pangea Cyber blog on…

AuthZ: Access Controls from A to Z
Uncategorized

AuthZ: Access Controls from A to Z

May 28, 2024May 8, 2026

Your Apps mature over time, why doesn’t your authorization policy? This was originally published on the Pangea Cyber blog on…

Introducing Passkeys from Pangea
Uncategorized

Introducing Passkeys from Pangea

March 6, 2024May 8, 2026

This was originally published on the Pangea Cyber blog on 06 March 2024. In today’s app-centric landscape, security is fundamental.…

Using IPs, Domains, and Geolocation to secure your Authentication
Uncategorized

Using IPs, Domains, and Geolocation to secure your Authentication

January 2, 2024May 8, 2026

This was originally published on the Pangea Cyber blog on 02 January 2024. When I say “secure authentication,” what comes…

AuthN in Minutes: MFA, EULAs, and Social Auth out of the Box
Uncategorized

AuthN in Minutes: MFA, EULAs, and Social Auth out of the Box

October 16, 2023April 18, 2025

This was originally published on the Pangea Cyber blog on 16 October 2023. When we think about Authentication, every developer…

Posts navigation

Older posts

Who am I?

I'm Keith Casey and based in Central Indiana. I've been an engineer, software developer, evangelist, and entrepreneur. You can read about me here.

Popular Posts

  • So you want to build an App
  • Developers have Two Goals in Life
  • API Adoption: The Dangerous Delay
  • The Business Case for Developer Experience

Recent Posts

  • Hashing vs Encoding vs Encrypting vs Signing
  • Mistakes and Successes in Building ScottAdamsSaid
  • Developers are Solving The Wrong Problem
  • My Favorite Books from 2025
  • What 4chan is up to since Charlie Kirk was murdered

Copyright © 2026 Caseysoftware | Ace News by Ascendoor | Powered by WordPress.