
lakshay goyal
@lakshayg2004
Followers
47
Following
611
Media
16
Statuses
36
Student at K.R. Mangalam University | MERN and DevOps Developer | Data Science Learner
Joined August 2024
While working on the Exness and n8n Project, I learn about the new term EDA (Event-Driven Architecture). EDA is a method of developing an enterprise It system that allows information to flow in real time between applications, microservices, and connected devices as events occur
1
0
22
Web3 Update. Build a Solana DApps Application, where u can: -> Request Airdrop (on Devnet) -> See your wallet Balance -> Sign Message. -> Send SOL to another account (on devnet). I am not a UI expert, so please judge me based on that. I use AI for UI (for being honest). The
0
0
5
Learning of this week in Super30: -> learned web3 basics. -> Hashing and Encryption -> Proof of work and stake -> HD wallets and seed phase -> RPC calling. -> Solana foundations -> Token in Solana -> Data models in Solana -> PDA's -> Accounts and Minting in Solana -> Ownership,
0
0
3
I wonder why most companies still use passwords as their primary authentication, when tech giants like Google, Microsoft, and Apple are using passkey authentication? Passkey is used to reduce human errors bcz the OTP and password can easily be hacked. Under the hood, passkey
0
0
4
While learning about a Distributed database, I always wonder how the backend knows which database to take details from? While surfing the internet, I got to know about consistent hashing. This is a System Design topic, which helps to scale the database horizontally. and used to
0
0
6
Guys, I got brainwashed by @Snorlxz for using bun.js as a package manager. And now I've got addicted to it 😅
1
0
9
Ever thought about how Google or any third-party services authenticate any user ?? While learning about Authentication, I found out that this platform utilizes an OAuth 2.0 service to authenticate users without requiring passwords, thereby preventing interception attacks. It
0
0
4
While looking in-depth at the JWT authentication, I found this master blog: https://t.co/661wTM5f7j Beautiful blog talks about the 2 ways to authenticate users using JWT secrets. From now on, I am considering using RS256 instead of normal HS256 in my next project. 😎 @auth0
auth0.com
Learn the difference between RS256 and HS256 JWT signing algorithms and which one is recommended to use in applications.
0
0
4
0
0
7