My Articles About Tech

Photo by Alexandre Debiève on Unsplash

Time and again, I write an in-depth overview of how a certain technology works.

Here are is the ever-expandable list of all such stories:

How End-to-end encryption works:

An in-depth explanation of how Facebook’s much-advertised end-to-end encryption of WhatsApp (seems to) work(s):

--

--

--

Author of Comprehensive Approach to Senior Developer Interview), Startup writer, Programmer, Tech Career Blogger, Education Engagement Enthusiast

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Why do most people ignore two-factor authentication?

Secure Data In Software Development

How To Find Hidden Spyware On Android Smartphones

find hidden spyware on Android

News — At The Edge — 4/21

SIEM Lab Tutorial in Azure Sentinel

What are the Worst Types of Ransomware Attacks?

Heroic Box Sale + Heroic Event Results

{UPDATE} Dance Experts Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Pen Magnet

Pen Magnet

Author of Comprehensive Approach to Senior Developer Interview), Startup writer, Programmer, Tech Career Blogger, Education Engagement Enthusiast

More from Medium

Software engineering — are we entering a mediocre age?

This Technology Will Transfer Thoughts To Texts!

Eloquently Failing Forward as a Software Engineer

When Elon Musk Fired His Assistant For Asking for a Raise