Hacker Times
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
tonyhb
on March 18, 2014
|
parent
|
context
|
favorite
| on:
How we overcame the security flaws of performing R...
Out of all of these, I've always found the HMAC hashed request in OAuth 1 to make the most sense from a basic security point of view. The only concern being token refreshes.
Consider applying for YC's Summer 2026 batch! Applications are open till May 4
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: