• Security is quality under attack. Hard-won lessons in software security, from someone who built the programs and wrote the standards.

authorization

House key versus user authentication

I got an interesting question regarding the technologies we use for authentication that I will discuss here. The gist of the question is that we try to go all out on the technologies we use for the authentication, even trying unsuitable technologies like biometrics, while, on the other hand, we still use fairly simple keys ...

Read More