search

There are two major factors in an HTTPS connection, a valid certificate that server presents during handshaking, and a cipher suite to be used for data encryption during transmission. The certificate is the essential component and serves as a proof of identity of the server. The client will only trust the server if the server can provide a valid certificate that is signed by one of the trusted Certificate Authorities that come pre-installed in the client, otherwise, the connection will be aborte

Bharat Dwarkani shared on Feb 03, 2020
image
medium.com
bookmarks
share
visibility2
visibility2 share bookmarks

One of the most common use cases happens when our application needs to communicate with a web service in order to exchange data. This data exchange can oscillate from a less to a more sensitive nature, and vary between a login request, user data alteration petition, etc.

Bharat Dwarkani shared on Dec 15, 2019
image
medium.com
bookmarks
share
visibility9
visibility9 share bookmarks

As you may experience, there are some scenarios in which applications need to store sensitive data on the user’s device. e.g., JWT for rest web services or user’s data in offline apps (e.g., user’s authentication/authorization in the app). Let’s see how can we protect our data from malicious users!

Bharat Dwarkani shared on Aug 26, 2019
image
android.jlelse.eu
bookmarks
share
visibility5
visibility5 share bookmarks

This article will show you how to work with keyguard, how to create and manage cryptographic keys and how to encrypt and decrypt data in Android.

Bharat Dwarkani shared on Aug 20, 2019
image
proandroiddev.com
bookmarks
share
visibility7
visibility7 share bookmarks

At some point in time, we all wanted to keep our data secure from being hacked/reverse engineered. The posts provides basic security mechanisms

Bharat Dwarkani shared on Aug 16, 2019
image
medium.com
bookmarks
share
visibility13
visibility13 share bookmarks
add