Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
mh8h
on May 9, 2017
|
parent
|
context
|
favorite
| on:
Authentication Techniques for APIs
What's the hazard?
sk5t
on May 9, 2017
[–]
The problem is the client can modify and post the ciphertext all it likes until, eventually, the server does something undesirable, since the server is merely decrypting and acting on the data without verifying it hasn't been tampered with.
Consider applying for YC's Summer 2025 batch! Applications are open till May 13
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: