ByteHide Support Center
  • English
Go to website
Back
Articles on:Use of the Products
Discover how to use ByteHide products efficiently with step-by-step instructions.

Categories

  • Introduction & First Steps
  • Organization & Teams
  • Security & Privacy
  • Configuration & Integrations
  • Use of the Products
  • Billing & Plans
  • Support & Contact
  • Secrets (Decentralized Secrets Manager)
    How do I securely store API keys and credentials using Secrets? Secrets allows you to store, encrypt, and manage API keys, passwords, and tokens in a secure vault. You can access them via the ByteHide dashboard or integrate them directly into your application using our SDK or API. How does Secrets integrate with my existing CI/CD pipeline? Secrets integrates with CI/CD workflows by securely injecting secrets into your build and deployment processes. Using our SDK orFew readers
  • Monitor (Runtime application self-protection)
    What types of threats does Monitor detect? Monitor detects multiple types of security threats, including: ✔ Reverse engineering attempts (debuggers, memory dumping, hooking) ✔ Tampering & unauthorized modifications (patching, memory manipulation) ✔ Malware & cheat tools (Frida, Xposed, GameGuardian) ✔ Environment risks (rooted/jailbroken devices, emulators, sandboxes) ✔ Network threats (traffic sniffing, man-in-the-middle attacks) ✔ Unauthorized device usFew readers
  • Logs (Securely manage your app logs)
    How do I enable and configure Logs for my applications? Install the ByteHide Logs SDK in your application. Initialize the SDK with your API key. Set the log levels (Info, Warning, Error, Debug, etc.). Enable encryption to protect sensitive data. Configure log destinations (cloud storage, local file, console). What types of evFew readers
  • Storage (Object storage powered by Post-Quantum Cryptography)
    How do I upload and manage files in Storage? To upload files, you can use the Storage SDK for .NET, which provides an intuitive API. You can upload files as public, private, or temporary, and configure encryption and compression. Managing files includes listing, searching, organizing into directories, and setting expiration rules for temporary files. Example of uploading a public file:Few readers

Not finding what you are looking for?

Chat with us or send us an email.

  • Chat with us
  • Send us an email
© 2025 ByteHide Support Center