White-box cryptography combines methods of encryption and obfuscation to embed secret keys within application code. The goal is to combine code and keys in such a way that the two are indistinguishable to an attacker, and the new “white-box” program can be safely run in an insecure environment.
In microservice architectures, it’s fairly common to have a project that includes different worker types. A Makefile can be used to manage the creation of multiple programs, but the Go toolchain has a tool that can be used as well, go generate.
An anonymous struct is just like a normal struct, but it is defined without a name and therefore cannot be referenced elsewhere in the code.
What is Superdense coding? π Superdense coding is a quantum communications protocol that allows a user to send 2 classical bits by sending only 1 qubit.
time.Time is the perfect choice for handling times in Go in most cases, it even comes in the standard library!
Go is a strongly typed language, which means at any point a developer should know exactly what type of value they are dealing with.
I’ve often seen, and have been responsible for, throwing code into packages without much thought. I’ve quickly drawn a line in the sand and started putting code into different folders (which in Go are different packages by definition) just for the sake of findability.
time.Time makes dealing with dates and times in Go a breeze, and it even comes bundled in the standard library!
Golang is King when it comes to concurrency. No other language has so many tools right out of the box, and one of those tools is the standard library’s sync.
Interfaces in Go allow us to treat different types as the same data type temporarily because both types implement the same kind of behavior.
Errors in Go are a hot topic. Many newcomers to the language immediately level their first criticism, “errors in go are clunky!
Go is becoming very popular for backend web development, and JWT’s are one of the most popular ways to handle authentication on API requests.
To “Brute Force” something (when talking about computers) means to systematically try every possible combination until you find the right answer.
We think the smartest way to learn to code is to make sure youβre never bored.
Want to encrypt text with a password or private key in Python? AES-256 is a solid symmetric cipher that is commonly used to encrypt data for oneself.
Agreement π By signing up to be an Affiliate in the Boot.dev Affiliate Program (“Program”) you are agreeing to be bound by the following terms and conditions (“Terms of Service”).
Email us here: hello at boot.dev The at is an @ symbol. Social links: YouTube Podcast Twitter LinkedIn Discord If you’re interested in any of the following just shoot us an email π Partnerships and sponsorships π Are you looking to have educational content created about your product?
If you can’t find the answer to your question here, please contact us. How long will it take to learn enough to be hired?
Thanks for being a member of Boot.dev! If you are not entirely satisfied with your purchase, we’re here to help.
Politicians in the United States have been claiming recently that end-to-end encryption is certainly too dangerous to permit.
Caching images in React Native can be easy, even if you are using Expo’s managed workflow.
The purpose of cryptography is to keep information private, and the purpose of open-source is to make code public… So we shouldn’t open-source our cryptography algorithms right?
Building a from-scratch server or using a lightweight framework is empowering. With that power comes responsibility, specifically the responsibility to securely store user’s passwords.
If you are getting into cryptography, or just trying to understand the fundamentals, you may have noticed that the exclusive or (XOR) operation is used quite often, especially in ciphers.
JavaScript’s built-in with statement specifies the default object for the given property and gives us a shorthand for writing long object references.