Recently, WhatsApp updated its privacy policy. This event, along with the ongoing discussions on privacy concerns about the online platforms we used every day, created interest in fields of privacy and security and migration to other messaging platforms such as Signal.

One of the questions about this event was how End-to-End encryption and open-source will provide privacy and security. I also wrote an article about this topic recently.

In this article, I will try to explain how a non-profit organization can afford to serve millions of free video calls, without going into technical details of the protocols used as much…


Yakınlarda Whatsapp’ın kullanıcı gizlilik sözleşmesini yenilemesi ile kullandığımız mesajlaşma platformlarındaki verilerimizin güvenliği ve gizliliği konuları tekrar gündeme geldi. Bilgilerin sosyal medya üzerinde hızla yayılması sonucunda Signal ve Telegram gibi bir çok alternatif mesajlaşma platformu değerlendirilmeye başlandı.

Bu konuda seçimimizi yapmadan önce teknik anlamda uçtan uca şifrelemenin, ve bir mesajlaşma platformu uygulamasının açık kaynak kodlu (Open source) oluşunun neden önemli olduğunu anlamanın oldukça önemli olduğunu düşünüyorum. Bu makalemde bu iki kavramın neden önemli olduğunu ve bir araya geldiklerinde nasıl bir etki oluşturduklarını olabildiğince sadeleştirerek anlatmaya çalışacağım. …


Recently, WhatsApp updated its privacy policy. This event, along with the ongoing discussions on privacy concerns about the online platforms we used every day, created interest in fields of privacy and security and migration to other messaging platforms such as Signal.

I think it is very important to know why is it important that a messaging application is using end-to-end encryption, and why is it important that it is open-source, in the context of privacy and security. In this article, I will try to explain plainly why these two concepts are important, and how do they interact. …


The terminal is a very powerful tool. It enables you to do any kind of operation on any system, scale it, and automate it. But using a powerful tool has its risks: when working on important infrastructure or data, execution of a wrong command can lead to system downtime, loss of data, or in better cases, loss of your precious time.

When the stakes are high, stricter precautions are called for. …


Photo by Markus Spiske on Unsplash

As cloud usage got widespread, command-line tools such as AWS CLI and Terraform became the bread-and-butter of daily infrastructure operations.

Today, how users store their credentials is one of the important security issues about these command-line tools as companies potentially have plain-text secrets of their sensitive cloud infrastructure in their employees’ home folders or repositories.

The solution to this issue is actually simple: using a password database on your computer ensures that your passwords, ssh keys, and browser passwords are encrypted safely every time you lock your computer and walk away.

KeepassXC is a password database that provides these features…

Fırat Civaner

Backend developer with interest in big data analytics architectures and information security.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store