<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Vishal Kandu</title>
    <description>The latest articles on DEV Community by Vishal Kandu (@vishalkandu01).</description>
    <link>https://dev.to/vishalkandu01</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F753039%2Ff5e30def-5d4a-4f29-a726-b743ffa848ad.png</url>
      <title>DEV Community: Vishal Kandu</title>
      <link>https://dev.to/vishalkandu01</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/vishalkandu01"/>
    <language>en</language>
    <item>
      <title>Why getting token from 'header' is more secure</title>
      <dc:creator>Vishal Kandu</dc:creator>
      <pubDate>Sun, 03 Dec 2023 11:12:47 +0000</pubDate>
      <link>https://dev.to/vishalkandu01/why-getting-token-from-header-is-more-secure-7p3</link>
      <guid>https://dev.to/vishalkandu01/why-getting-token-from-header-is-more-secure-7p3</guid>
      <description>&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Preventing Exposure in URLs: Tokens contained in the header are shielded from exposure in the URL. When URL parameters contain sensitive data, there may be a security issue because they are frequently recorded in multiple locations, including browser history and server logs.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Cross-Site Request Forgery (CSRF) Protection: Placing tokens in the header helps protect against CSRF attacks. Malicious websites may be able to operate on behalf of the user without authorization if tokens are present in the request body or URL. Tokens based on headers are immune to these kinds of attacks.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Keeping Cookies Safe from Cross-Site Scripting (XSS) Attacks: Tokens contained in cookies may be subject to XSS attacks. Tokens stored in headers are less likely to be accessed or altered by malicious scripts.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>webdev</category>
      <category>backend</category>
      <category>security</category>
    </item>
  </channel>
</rss>
