-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
https://www.codewars.com/ helped me a lot in this department
One thing I will mention for "most secure" is that you could add a second layer of encryption based on liboqs which aims to be quantum resistant (mostly important for asymmetric algorithms, symmetric algorithms are already thought to be quantum resistant). We don't know if any of the quantum resistant algorithms are any good or not. They could all be broken, so only use them as a second layer on top of existing encryption schemes, but if you want "the best", then that's what I would do: use standard tools with the biggest variants of the algorithm and then put a layer of post-quantum crypto on top of it.
And of course, remember your crypto is only as strong as the weakest link. You need to be using good passphrases. Use diceware `diceware -n 9` to generate a password that even a Type I civilization would have trouble breaking.
i use https://github.com/mdipierro/human_security to simplify interaction with the cryptography library
Related posts
-
2048 Bit RSA and the Year 2030
-
Changing default Openssl signature algorithm and key exchange algorithm to use PQC Dilithium and Kyber
-
Ask HN: What's the Status of Post-Quantum (PQC) in TLS and QUIC?
-
Liboqs - Quantum safe cryptography library (not for production use)
-
Liboqs – Quantum safe cryptography research library