So you’re building an application and have just realized you want to allow your users to login. You’re not sure that you know how to handle this ...
For further actions, you may consider blocking this person and/or reporting abuse
Token = Weak security.
Token + SSL = Medium security.
Token + SSL + 2 factor Auth = High security.
If there is some malicious program running in your PC such as a keylogger then no strategy will make you secure other than using some popular AntiVirus.
Where's Part 2 and beyond? :)
It’s coming. Part 2 is much longer, so it’s taking longer to write.
Life got in the way, but here's part 2 finally dev.to/ghardin137/web-authenticati...
Hey this is a great topic to write about and a great and fun analogy to use!
That's a great question. That's definitely one vulnerability of using token systems. I'll be explaining this and more in the next installment in the series.