I get into the same argument with security auditors about twice a year. It usually starts when they ask if our data is Learn about Java Cryptography.
Java Cryptography: I was reviewing a pull request this morning—let's call the developer "Dave"—and I saw something that made me physically wince.


