Mansplainings

useTransition and useDeferredValue in React 18

useTransition and useDeferredValue are two new hooks React introduced with React 18 earlier this year. These two hooks make use…

2 years ago

Challenges of a decentralized transaction system

Courtesy: Yagi Studio/Getty Images In the previous article, we looked at the motivation behind blockchain. In this article, let’s look…

2 years ago

The motivation behind blockchain

Courtesy: https://www.goodbadmarketing.com/ The online literature on blockchain is torn between too simplistic rundowns for non-techies and advanced hieroglyphic riddles targeted…

2 years ago

Reauthenticating a user without redirection in OIDC

Browser redirection is an integral part of the Open ID Connect (OIDC) authentication flow. At the same time, it is…

2 years ago

Best practices for OIDC authentication in SPAs

Single-Page Applications (SPAs) are fast becoming ubiquitous as they provide a far better user experience over the traditional multi-page applications.…

2 years ago

How does TOTP authentication work?

Unless you have been living under a rock, you would be very used to authenticating yourself using an authenticator app…

4 years ago

How does HOTP authentication work?

Before smartphones were popular, hardware tokens that produced an HOTP code were a popular way of performing two-factor authentications. Businesses…

4 years ago

What is HMAC and how does it work?

HMAC stands for Hash-based Message Authentication Code or Keyed-hash Message Authentication Code. We use it to verify the authenticity and…

4 years ago

How does CIAM differ from IAM?

Even though CIAM and IAM are technologically similar, they both serve two different purposes. Understanding these differences is very important…

5 years ago

The Authorization Code Redirect URI Manipulation attack in OAuth 2.0

Changing the authorization code redirect URI is one of the ways by which attackers try to game the OAuth 2.0…

5 years ago