- Sweden
-
11:10
(UTC +02:00) - https://www.gleisner.legal
- @carlgleisner
- in/carlgleisner
- @carlgleisner@infosec.exchange
- @carlgleisner.bsky.social
Security
Principles to help you design and deploy a zero trust architecture
🔐 A detailed example for how to encrypt data in an Elixir (Phoenix v1.7) App before inserting into a database using Ecto Types
🌻 fields is a collection of useful field definitions (Custom Ecto Types) that helps you easily define an Ecto Schema with validation, encryption and hashing functions so that you can ship your Elix…
Elixir encryption library designed for Ecto
WebauthnComponents allows Phoenix developers to quickly add passwordless authentication to LiveView applications.
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
A place for creators and users of password managers to collaborate on resources to make password management better.
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.
Minimal Elixir Phoenix deploy to fly.io using Overmind and Tailscale
1Password SCIM Bridge deployment examples
Community guide to securing and improving privacy on macOS.
Connect your devices into a secure WireGuard®-based overlay network with SSO, MFA and granular access controls.