Building Defensible Solutions to Weird Problems
Conventional wisdom says, “Don’t roll your own crypto,” but conventional wisdom is eerily silent when you’re tasked with solving the sort of weird problems that developers face.
Want to anonymize the IP addresses of your visitors but still be able to identify traffic patterns?
Need to be able to identify duplicate passwords, but don’t want to make a soft target for password crackers?
Are you storing encrypted data in a database, but still need to be able to search for specific values?
Solutions to these problems and many like them will be presented and discussed.
Scott resides at the intersection of PHP, security, cryptography, and open source software.