Illustration of HTTPS One-Way and Two-Way Authentication

Illustration of HTTPS One-Way and Two-Way Authentication

1. Http HyperText Transfer Protocol, is the most widely used protocol on the Internet, a standard that all WWW files must follow. The data transmitted using the HTTP protocol is unencrypted, which means it is in plaintext, making it very insecure to transmit private information using the HTTP protocol. Uses TCP port: 80 2. Https … Read more

HTTPS Interface Encryption and Authentication

HTTPS Interface Encryption and Authentication

1. Why Use HTTPS Instead of HTTP 1.1 Differences Between HTTPS and HTTP 1) The HTTPS protocol requires a certificate application from a CA, and generally, free certificates are rare and often require payment. 2) HTTP is the Hypertext Transfer Protocol, where information is transmitted in plain text, while HTTPS is a secure SSL encrypted … Read more

Security in Embedded Design

Security in Embedded Design

Embedded systems are the core of modern electronic devices, and their security is crucial. These systems often contain sensitive data and critical functions, and if attacked, could lead to data breaches, system failures, or even physical damage. Therefore, security must be fully considered during the embedded design process. This article will delve into the security … Read more

Flexible Authentication Methods for Secure IoT Device Connections

Flexible Authentication Methods for Secure IoT Device Connections

Introduction: Flexible Authentication/Authorization Mechanisms Provide Efficient Security Assurance EMQX has always placed great emphasis on security, providing continuous enhancement of security guarantees for IoT users through a wide range of out-of-the-box security features, including MQTT over TLS/SSL, transmission encryption and authentication integration based on national cryptography algorithms, as well as various identity authentication functions such … Read more

Analysis of Bluetooth Security Vulnerabilities and Attack Methods

Analysis of Bluetooth Security Vulnerabilities and Attack Methods

Analysis of Bluetooth Technology’s Security Vulnerabilities and Attack Methods In current network applications, the Internet of Things (IoT) has a ubiquitous demand for diversity, low cost, low rate, and short distance. Such demands are mainly realized through low-speed network protocols like Bluetooth. Bluetooth is an open standard for short-range communication, utilizing embedded chips to achieve … Read more

Tips for High-Scale MQTT Messaging with EMQ

Tips for High-Scale MQTT Messaging with EMQ

If the number of devices reaches one million, the database will have to handle two million authentication records, which will significantly affect the database’s performance. Is there a batch way to define ACL authentication? 1. ACL Authentication Rules Under normal business usage, the behavior of clients can be restricted using ACL. For example, Client A … Read more

Analysis of Rails 8 Authentication Implementation (1) – Theoretical Preparation

Analysis of Rails 8 Authentication Implementation (1) - Theoretical Preparation

Ten days ago, 37signals published an article: A vanilla Rails stack is plenty, this article reinforced my long-standing belief: If Rails provides a solution, it’s best to stick with Rails’ solution. Maintaining minimal dependencies and reducing upgrade barriers is certainly important; more importantly, it is to learn the “optimal solution” after top developers think and … Read more

Understanding User Authentication in Web Applications

Understanding User Authentication in Web Applications

https://thecopenhagenbook.com/ Server-side tokens A server-side token is any long, random string that is stored on the server. It may be persisted in a database or in-memory data store (e.g. Redis) and is used for authentication and verification. A token can be validated by checking if it exists in storage. Examples include session IDs, email verification … Read more