Crypto wallets security for developers
The secret life of Android apps
Data is a new security boundary
React Native security: addressing typical mistakes
Cryptographic protection of ML models
The art of secure architecture
Encryption export regulations. Why should mobile developers care?
iOS vulnerabilities and how to fix them
End-to-end encrypted doesn't mean secure
Secure Authentication. Are you sure you do it right?
Use cryptography, don’t learn it
Security engineering: from encryption to software architecture patterns
Maintaining cryptographic library for 12 languages
10 lines of encryption, 1500 lines of key management
Security, privacy and cryptography at WWDC19
"Defense in depth": trench warfare principles for building secure distributed applications