DEV Community

Discussion on: A Brief Introduction to Securing Applications with JWT

Collapse
 
abdullahdibas profile image
Abdullah Di'bas • Edited

The attacker can't benefit from having this data, since it doesn't have any sensitive information as mentioned in the article. Any user can 'claim' that he has the permission to do anything till whatever expiry date he chooses but he needs to prove that using the signature which he doesn't have control on.