A few days ago I opened the calculator on my new phone and got a message: “Calculator would like to access your contacts”.
What if, just like apps on our phones, npm packages had to declare what permissions they required?
#npm #security #persmissons #package
What if, just like apps on our phones, npm packages had to declare what permissions they required?
#npm #security #persmissons #package
Hacker Noon
npm package permissions — an idea
A few days ago I opened the calculator on my new phone and got a message: “Calculator would like to access your contacts”.
For a number of years I’ve been interested in the security provided by passwords, and the methods being developed to attack password-protected accounts. So I thought I’d see how successfully everyday developers, without specialist knowledge, could hack millions of passwords.
5 min read
#Security
5 min read
#Security
Medium
20 Hours, $18, and 11 Million Passwords Cracked
I thought I’d see how successfully everyday developers, without specialist knowledge, could hack millions of passwords.
In this article I am going to talk about two different ways of authentication: stateful and stateless authentication. If you have learnt about networking, you may already heard about stateful and stateless, but in this article I am going to give these two adjectives other meanings.
5 min read
#Auth #Security
5 min read
#Auth #Security
Medium
Stateful and stateless authentication
In this article I am going to talk about two different ways of authentication: stateful and stateless authentication. If you have learnt…
This tutorial explains the basics of OAuth 2.0 and how to deploy an OAuth2 authorization service in Node.js to Google Cloud Functions.
⏱ 8 min read
🔘 #OAuth2 #Security #JWT #Serverless
✍️ Don’t forget to say if you liked the article by leaving a comment below this post
⬇️
⏱ 8 min read
🔘 #OAuth2 #Security #JWT #Serverless
✍️ Don’t forget to say if you liked the article by leaving a comment below this post
⬇️
Medium
Understanding OAuth2 and Deploying a Basic OAuth2 Authorization Service to Cloud Functions
This tutorial explains the basics of OAuth 2.0 and how to deploy an OAuth2 authorization service in Node.js to Google Cloud Functions.
Ever since I started learning how to code, I have been fascinated by the level of trust we put in a simple command like pip install packagename
⏱ 11 minutes read
#security #hacking
⏱ 11 minutes read
#security #hacking
Medium
Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies
The Story of a Novel Supply Chain Attack
JavaScript is used everywhere today. It runs in your browser as well as in your backend. Besides, JavaScript is a highly dependent ecosystem on third-party libraries. Therefore, securing JavaScript requires following best practices to reduce the attack surface.
But, how do we keep JavaScript applications secure? Let’s find out.
⏱ 6 minutes read
#JavaScript #Security
But, how do we keep JavaScript applications secure? Let’s find out.
⏱ 6 minutes read
#JavaScript #Security
Medium
7 Steps to Secure JavaScript in 2021
These practices will help to secure your JavaScript execution