Thanks Ruth! Glad you enjoyed them and we appreciate the comment!!
@covfefe2936 Жыл бұрын
Amazing video!! Love this straight forward format easy to remember
@devcentral Жыл бұрын
Thanks for the comment and glad you enjoyed the video!!
@juliozaelsantillanruiz89972 ай бұрын
Very clear, thanks man, nice video 👍
@EasyPickens9992 жыл бұрын
Hi, first of all many thanks for the videos. In your first example you mention to avoid auto-decryption. Do you mean between the DB and the app? In the case of a user querying CC numbers, you would eventually need to decrypt, would this be done in the app?
@vishaliselvaraj13404 ай бұрын
perfect sir!
@skselim85362 жыл бұрын
Awesome 🌟
@devcentral2 жыл бұрын
Glad you liked it and thanks for the comment!
@BhargavRajaram2 жыл бұрын
These guys have just narrated what's there on OWASP website.
@hammasahmed55922 жыл бұрын
Failure, I was expecting a failure in the algorithm that would lead to data exposure, not a failure in cryptographic setup. The good point its the downgrade attack, if it's possible to downgrade a version of cryptos, this would actually be a failure.
@seyedmohammadmortezasanaie8346 Жыл бұрын
Your explanation was very bad. This beautiful type of attack could have much better examples 👎