Introducing Top Secret
We’ve written about how to prevent logging sensitive information when making network requests, but that approach only works if you’re dealing with parameters.
Read MoreWe’ve written about how to prevent logging sensitive information when making network requests, but that approach only works if you’re dealing with parameters.
Read MoreThe Rails defaults are a good foundation, but it's still your responsibility to filter sensitive information from logs when using external APIs, services, and tools.
Read MoreLearn how to authorize requests at the routing layer to improve security and ergonomics.
Read MoreRails writes a new cache entry based on the first request. But what happens when that request is from an admin?
Read MorePassword managers aren't the only way to store and share sensitive information. Learn how to create a simple CLI for encrypting files.
Read More