Menu
Sign In Pricing Add Podcast

The Changelog: Software Development, Open Source

Over the top auth strategies (Friends)

1503.305 - 1527.591 Dan Moore

I think you need to, as someone holding passwords, right, any of the systems, you need to make sure you take care of passwords. You need to make sure that you hash them appropriately. You make them hard enough to use for an attacker that you can avoid credential stuffing attacks. but easy enough for users to use. And I think the reason is that it's lowest common denominator, right?

0
💬 0

Comments

There are no comments yet.

Log in to comment.