paint-brush
Building Application Backends with End-to-end Encryptionby@cossack-labs
22,739 reads
22,739 reads

Building Application Backends with End-to-end Encryption

by Cossack Labs7mOctober 17th, 2017
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

<em>A closer look at the well-documented, but rarely implemented properties of end-to-end encryption.</em>

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - Building Application Backends with End-to-end Encryption
Cossack Labs HackerNoon profile picture
Cossack Labs

Cossack Labs

@cossack-labs

Cossack Labs helps companies to efficiently and conveniently protect sensitive data.

L O A D I N G
. . . comments & more!

About Author

Cossack Labs HackerNoon profile picture
Cossack Labs@cossack-labs
Cossack Labs helps companies to efficiently and conveniently protect sensitive data.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite