Reverse-engineering the pin code authentication flow for mobile apps

I am developing a mobile application for financial usage. I want to make it as secure as the existing apps in the market. Many apps ask the user to enter a PIN code to unlock the app after period of time or when the user wants to perform s… Continue reading Reverse-engineering the pin code authentication flow for mobile apps

Is using a developer key to protect a REST API good practice?

I’d like to implement a RESTful API service over HTTP that developers can call from their server side environments.
I intend to use a cryptographically secure pseudo-random number generator (CSPRNG) to generate keys and then convert the bi… Continue reading Is using a developer key to protect a REST API good practice?

Is it possible to avoid exposing the fact that an e-mail address is used by a web application (API) while still ensuring a decent UX?

One of the raised issues for a Web API is that for an e-mail based authentication (e-mail and password) the Register user method returns something like "the registration e-mail has been sent" regardless of the e-mail being used o… Continue reading Is it possible to avoid exposing the fact that an e-mail address is used by a web application (API) while still ensuring a decent UX?