Blog
Developer tutorials, tips, and product updates.
Passwords
Bcrypt vs Argon2: Choosing a Password Hashing Algorithm
Compare the two leading password hashing algorithms and understand when to use each one.
Read more →
JWT
JWT Best Practices: Signing, Expiry, and Key Rotation
Avoid common JWT pitfalls with proper signing algorithms, expiry handling, and key management.
Read more →
2FA
Implementing TOTP Two-Factor Authentication
Add time-based one-time passwords to your app with QR codes and RFC 6238 compliance.
Read more →
Encryption
AES-GCM Encryption for Developers: A Practical Guide
Understand authenticated encryption with AES-256-GCM and how to use it correctly.
Read more →
Keys
Generating Secure API Keys: Formats and Best Practices
UUID, nanoid, or cryptographic random — pick the right API key format for your use case.
Read more →