menu

Things we are best at.

monitor.png

Our mission is to modernize enterprise systems for humans to use.

cards.png

We use tech like SCALA, BLOCKCHAIN, ANGULAR and NATIVE MOBILE SDKs.

mail.png

To every project we bring an adaptive and resourceful approach through agile methods.

How others see us.

18

years of building custom software

3

complex projects completed last year

11

countries with Wanari projects

We love coding.
Software development is our passion.

Team Wanari.

Get to know us

Team Wanari.

András Kecskés

András Kecskés

Catchy

Frontend Developer

Fanni Medvey

Fanni Medvey

Picimaci

Backend Developer

Róbert Klacso

Róbert Klacso

Robi

Mobile Application Developer

We build beautiful software that creates an environment in which users can operate seamlessly and happily. We can make your life better by creating software that supports you in doing whatever fulfills your goals. We build software that will assist you and your company internally and connects you to your customers flawlessly. We want your employees to be productive and efficient without frustration. We want your customers to be satisfied and content with you.

Meet the others

We are proud to have worked with

Interested in
working with us?

Contact us, we are happy to answer your questions:

Let's talk

Know your developer

Are you working together with a developer, but have no idea what kind of developer he or she is? (Let's call him/her Sam for the simplicity!) Are you afraid to ask? No problem! This test will help you to find it out immediately!

Akka JWT with RSA (asymmetric encryption algorithm)

Alex Sükein 2020-10-02
In our previous post, we dived into JWT generation and validation with RSA in Spring. Now let’s see how to do the same in Scala with Akka.

Spring JWT with RSA (asymmetric encryption algorithm)

Alex Sükein 2020-09-25
Let's say we have an "auth server" that signs tokens for us and a "resource server" where we store some pretty sensitive data. We trust the auth server and we want to validate that the JWT we get indeed comes from that trusted auth server. In other words, how can we be sure that the guy who wants to detonate our printers is using a JWT that is from that very auth server?

Check out our latest blogposts!