DEV Community

Discussion on: Web Authentication For Actual Humans, Part One

Collapse
 
ghardin137 profile image
Greg Hardin

That's a great question. That's definitely one vulnerability of using token systems. I'll be explaining this and more in the next installment in the series.