Services: Application Security

SHA or MD5? Which AES key-length is best? PKI or Password Hashes? PRNGs missing entropy? Are you supposed to encrypt all of the PII? Are you protected from code injections?

You've got acronym overload, and you haven't even discussed whether or not your application's state can be hacked.

Need your application's security design analyzed?

Contact us for a review.