DEV Community

# cryptography

Discussions on encryption, hashing, ciphers, and cryptographic protocols.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
VeraSnap Building a Cryptographic Evidence Capture App for Android with Kotlin, CameraX, and Hardware-Backed Security

VeraSnap Building a Cryptographic Evidence Capture App for Android with Kotlin, CameraX, and Hardware-Backed Security

Comments
13 min read
VCP v1.1: Building Cryptographic Audit Trails for AI Trading Systems After the 2026 Silver Crash

VCP v1.1: Building Cryptographic Audit Trails for AI Trading Systems After the 2026 Silver Crash

Comments
20 min read
VCP-RISK: Building Cryptographically Verifiable Risk Management Audit Trails for Algorithmic Trading

VCP-RISK: Building Cryptographically Verifiable Risk Management Audit Trails for Algorithmic Trading

Comments
27 min read
The $255M Wake-Up Call: How Cryptographic Audit Trails Could Have Caught a Quant Fund Fraud in Minutes, Not Years

The $255M Wake-Up Call: How Cryptographic Audit Trails Could Have Caught a Quant Fund Fraud in Minutes, Not Years

Comments
18 min read
Building AI's Flight Recorder: A Developer's Response to the Doomsday Clock

Building AI's Flight Recorder: A Developer's Response to the Doomsday Clock

Comments
13 min read
Proving What AI Didn't Generate: Building Cryptographic Refusal Logs with CAP-SRP

Proving What AI Didn't Generate: Building Cryptographic Refusal Logs with CAP-SRP

1
Comments
14 min read
Building Deepfake-Resistant Hiring Systems: Cryptographic Audit Trails as Defense Against Nation-State Identity Fraud

Building Deepfake-Resistant Hiring Systems: Cryptographic Audit Trails as Defense Against Nation-State Identity Fraud

Comments
14 min read
Building Tamper-Proof Media Apps: C2PA vs CPP Deep Dive for Developers

Building Tamper-Proof Media Apps: C2PA vs CPP Deep Dive for Developers

Comments
12 min read
Building Tamper-Evident Audit Trails for Trading Systems: A Complete VCP v1.1 Implementation Guide

Building Tamper-Evident Audit Trails for Trading Systems: A Complete VCP v1.1 Implementation Guide

Comments
24 min read
PGP and GPG Explained: Encrypt Files and Verify Authenticity

PGP and GPG Explained: Encrypt Files and Verify Authenticity

Comments
1 min read
VCP v1.1: Cryptographic Audit Trails for AI Trading Systems (EU AI Act Ready)

VCP v1.1: Cryptographic Audit Trails for AI Trading Systems (EU AI Act Ready)

1
Comments
10 min read
YAKMESH™ v2.5.0 - Post-Quantum P2P Mesh Network

YAKMESH™ v2.5.0 - Post-Quantum P2P Mesh Network

Comments
1 min read
Building a Camera That Cannot Lie: How VeriCapture's CPP Implementation Advances Verifiable Provenance

Building a Camera That Cannot Lie: How VeriCapture's CPP Implementation Advances Verifiable Provenance

Comments
7 min read
YAKMESH™ v2.0.0 - Post-Quantum P2P Mesh Network

YAKMESH™ v2.0.0 - Post-Quantum P2P Mesh Network

Comments
1 min read
Why Content Provenance Needs Deletion Detection: Introducing CPP v1.0

Why Content Provenance Needs Deletion Detection: Introducing CPP v1.0

Comments
7 min read
Building Tamper-Evident Audit Trails for Trading Systems: A Deep Dive into VCP v1.1

Building Tamper-Evident Audit Trails for Trading Systems: A Deep Dive into VCP v1.1

1
Comments
12 min read
Building Cryptographic Audit Trails for TradingView Strategies with VCP

Building Cryptographic Audit Trails for TradingView Strategies with VCP

1
Comments
5 min read
YAKMESH™ v1.7.0 - Post-Quantum P2P Mesh Network

YAKMESH™ v1.7.0 - Post-Quantum P2P Mesh Network

Comments
1 min read
YAKMESH™ v2.2.0 - Post-Quantum P2P Mesh Network

YAKMESH™ v2.2.0 - Post-Quantum P2P Mesh Network

Comments
1 min read
Building AI's Flight Recorder: Cryptographic Audit Trails for Algorithmic Trading Under the EU AI Act

Building AI's Flight Recorder: Cryptographic Audit Trails for Algorithmic Trading Under the EU AI Act

Comments
18 min read
Proving What AI Didn't Generate: A Cryptographic Solution to the Grok Crisis

Proving What AI Didn't Generate: A Cryptographic Solution to the Grok Crisis

Comments
8 min read
Why Your Secret Sharing Tool Needs Post-Quantum Cryptography Today

Why Your Secret Sharing Tool Needs Post-Quantum Cryptography Today

Comments
2 min read
Securing Your Environment Variables: A Proof-of-Concept Approach

Securing Your Environment Variables: A Proof-of-Concept Approach

5
Comments
4 min read
Quantum Doomsday Delayed (Again): Why the Latest Panic Over Post-Quantum Cryptography Feels Familiar

Quantum Doomsday Delayed (Again): Why the Latest Panic Over Post-Quantum Cryptography Feels Familiar

1
Comments
4 min read
Metaclass Polymorphic Crypto: Enhanced Proof of Concept

Metaclass Polymorphic Crypto: Enhanced Proof of Concept

5
Comments
5 min read
loading...