The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)
Dan Moore
I can walk through kind of how pass keys work if that'd be helpful. But anyway, there is a private key that is held someplace and that is what's used to kind of authenticate you. And they're also locked down to the domain, right? They're associated to a domain, which is really, really great too, because it removes all kinds of phishing problems, right?
0
💬
0
Comments
Log in to comment.
There are no comments yet.