Best of CryptographySeptember 2025

  1. 1
    Article
    Avatar of opensoulsOpenSouls·31w

    UUIDv47

    UUIDv47 is a library that enables reversible transformation between UUIDv7 (time-ordered) and UUIDv4 (random-appearing) formats. It allows developers to hide time-ordering from external APIs while maintaining internal chronological benefits, using cryptographically secure SipHash-2-4 algorithm with high performance and zero dependencies.

  2. 2
    Article
    Avatar of nodejsNode.js·33w

    Node.js

    Node.js v24.8.0 introduces HTTP/2 network inspection support in Chrome DevTools, allowing developers to track HTTP/2 calls during debugging. The release includes significant cryptography enhancements with support for Ed448, ML-DSA, KMAC, Argon2, and SLH-DSA algorithms in both node:crypto and Web Cryptography APIs. Additional improvements include CPU profiling APIs for worker threads, various bug fixes across modules like assert, fs, and streams, and dependency updates including npm 11.6.0.

  3. 3
    Article
    Avatar of webdevWebDev·32w

    UUIDv47

    UUIDv47 is a library that enables reversible transformation between UUIDv7 (time-ordered) and UUIDv4 (random-appearing) formats. It allows developers to hide time-ordering from external APIs while maintaining internal chronological benefits, using cryptographically secure SipHash-2-4 algorithm with high performance and zero dependencies.

  4. 4
    Article
    Avatar of nestjsdevsNestjs Developers·31w

    UUIDv47

    UUIDv47 is a library that enables reversible transformation between UUIDv7 (time-ordered) and UUIDv4 (random-appearing) formats. It allows developers to hide time-ordering from external APIs while maintaining internal chronological benefits, using cryptographically secure SipHash-2-4 algorithm with high performance and zero dependencies.

  5. 5
    Article
    Avatar of systemdesigncodexSystem Design Codex·33w

    JWT versus PASETO

    JWT and PASETO are both token-based authentication mechanisms for secure client-server communication. JWT is widely adopted but has security pitfalls like algorithm confusion attacks and complex configuration choices. PASETO was designed as a safer alternative with secure defaults, enforced modern cryptography, and simplified specifications to prevent developer errors. While JWT has better ecosystem support and adoption, PASETO offers improved security through its opinionated approach that removes insecure options.

  6. 6
    Article
    Avatar of devtoDEV·33w

    FestFund: Private Contributions & Public Recognition - A Zero-Knowledge Fundraising Solution

    FestFund is a fundraising platform that uses zero-knowledge proofs to enable private donations while maintaining public transparency. Built on Midnight Network, it allows donors to contribute anonymously while still providing verifiable leaderboards and milestone tracking. The platform reduces ZK proof generation time from 418ms to 1ms and includes features like cryptographic commitments, nullifier protection, and transparent accountability without exposing individual donation amounts.

  7. 7
    Video
    Avatar of bytemonkByteMonk·32w

    How Databases Store Passwords Securely

    Password security in databases relies on multiple layers of protection. Hash functions convert passwords into irreversible fingerprints, but hackers can use rainbow tables to crack common passwords. Adding unique salts prevents rainbow table attacks by making identical passwords produce different hashes. Adaptive algorithms like bcrypt, scrypt, and Argon2 slow down brute force attacks by making password hashing computationally expensive. Some companies add peppers (secret values stored separately) for extra protection. Major companies follow OWASP guidelines and are moving toward passwordless authentication using passkeys, which eliminate the need to store password data entirely.