Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That list is geared towards developers who don't have a strong background in cryptography and helping them choose a secure algorithm that is easy to implement. Because if you get it wrong, more vulnerabilities will be introduced.

Working around janky compliance standards is a whole separate topic.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: