Justin Richer
1 min readOct 31, 2018

--

Some conversations about this issue with large-scale service providers has shown me that synchronization of items at the authorization step is tractable, but it’s synchronization at the resource servers that’s ultimately problematic. As such, using hashes to protect presentation of shared secrets might be the best approach after all.

--

--

Justin Richer
Justin Richer

Written by Justin Richer

Justin Richer is a security architect and freelance consultant living in the Boston area. To get in touch, contact his company: https://bspk.io/

No responses yet