Welcome to Code Completion! We are a group of iOS developers and educators hoping to share what we love most about development, Apple technology, and completing your code!
Today, we discuss:
• Code Completion Club: https://codecompletion.io/jointheclub
• Indie App Spotlight, with three apps for you to check out:
• Charty by Rodrigo Araujo: https://apps.apple.com/us/app/charty-for-shortcuts/id1494386093?ls=1
• Cone by Kushagra Agarwal: https://apps.apple.com/us/app/cone-live-color-picker/id1221305627?mt=8
• MinBrowser by Ben Standaert: https://minbrowser.org
• WWDC Software and Hardware Predictions,
• App Clips one year later,
• In-App Purchases and External Payments,
• How Can The App Store Be a Better Place for Us As Developers?
• The Future of Objective-C
Follow us @CodeCompletion on Twitter to hear about our upcoming livestreams, videos, and other content. Also, join us for #CompleteTheCode and Compiler Error, two segments that test both your knowledge and our knowledge on Swift, Apple, and all things development!
Your hosts for this week:
Be sure to also sign up to our monthly newsletter, where we will recap the topics we discussed, reveal the answers to #CompleteTheCode, and share even more things we learned in between episodes.
You are what makes this show possible, so please be sure to share this with your friends and family who are also interested in any part of the app development process.
This week's episode of Code Completion is brought to you by Not Phở. Search for Not Phở on the iOS and macOS App Stores today to give it a try.
Complete the Code
1 - AES, or the American Encryption Standard, is a suite of symmetric block cyphers that was selected as a part of an open process hosted by NIST and the US government from 1997 to 2000 to replace DES.
2 - A one time pad is an early but very robust encryption technique, which can be uncrackable so long as the key on the pad is never re-used, is truly random, is longer than the plaintext, and is kept completely secret.
3 - Symmetric key algorithms use the same cryptographic keys for both encryption and decryption, while asymmetric key algorithms make use of a public key and a private key to encrypt and decrypt information.
4 - Unlike RSA which relies on large prime number factorization, Elliptic-curve cryptography makes use of a given elliptic curve’s geometric and algebraic properties, ultimately providing the same level of security as RSA with smaller keys.