Best practices about cryptography

Engineering playbooks, encryption walkthroughs, and practical guidance for teams shipping trust-worthy client experiences.

Nov 10, 202510 min read
How to Choose the Right Parameters for Argon2

A practical guide to picking Argon2id, Argon2i, or Argon2d settings, with ready-to-use presets for logins, credential vaults, and high-security workloads.

Nov 7, 20259 min read
How to Calculate an HMAC on Every Platform

Step-by-step recipes for generating keyed hashes (HMAC) across Windows, macOS, Linux, browser tools, and popular languages like Node.js and Python.

Nov 5, 20259 min read
Everything you need to know about MD5

A deep dive into MD5's origins, breakthrough adoption, devastating flaws, and how its collapse reshaped modern cryptography.

Nov 2, 20258 min read
How to Calculate a SHA-256 Hash: Practical Techniques for Every Platform

A hands-on walkthrough for generating SHA-256 hashes on Windows, macOS, Linux, and in the browser—plus tips for automation and verification.

Nov 1, 20257 min read
How to Calculate an MD5 Hash: The Complete Guide

A step-by-step guide to calculating MD5 hashes and checksums for text and files on Windows, macOS, and Linux, plus the easiest online tool.