Hackernews posts about OAuth
Related:
Cloudflare
- Show HN: An open source OAuth/auth system (github.com)
- New Overlapping Secrets on Azure DevOps OAuth (devblogs.microsoft.com)
- What's Wrong with the OAuth2 Implicit Grant? (fusionauth.io)
- What Does OAuth Do? [video] (www.youtube.com)
- Show HN: Pushbullet Chrome extension for manifest v3 (github.com)
- Show HN: Introducing Swiftybase – A No-Code Backend Builder (swiftybase.com)
- Certification Authority/Browser Forum adopts new security standards (security.googleblog.com)
- Show HN: Haystack Code Reviewer – Guided Tours for Pull Requests (haystackeditor.com)
- Matrix.org Will Migrate to MAS (matrix.org)
- On JavaScript's Weirdness (stack-auth.com)
- Why is OAuth still hard in 2023? (www.nango.dev)
- Google’s OAuth login doesn’t protect against purchasing a failed startup domain (trufflesecurity.com)
- OAuth from First Principles (stack-auth.com)
- Dear OAuth Providers (pilcrowonpaper.com)
- Google OAuth is broken (sort of) (trufflesecurity.com)
- What's OAuth2, anyway? (www.romaglushko.com)
- Oh-Auth – Abusing OAuth to take over millions of accounts (salt.security)
- Malware abuses Google OAuth endpoint to 'revive' cookies, hijack accounts (www.bleepingcomputer.com)
- Why use OpenID Connect instead of plain OAuth2? (security.stackexchange.com)
- Learn OAuth by building a client with Node.js (annotate.dev)
- Grammarly's OAuth Mistakes (fusionauth.io)
- Yaak 2.0 – Git, WebSockets, OAuth, and More (yaak.app)
- Show HN: Shadow IT Scan – Uncover SaaS Apps, Users and Risky OAuth Scopes (www.accessowl.io)
- Deadline looms: Google Workspace mandates OAuth by September 30 (www.theregister.com)
- Show HN: Scan Google Workspace for Unauthorized OAuth Applications (app.yeshid.com)
- The Sad Story of OAuth 2.0 and Open Standards (xahlee.info)
- You Probably Don't Need OAuth2/OpenID Connect: Here's Why (hackernoon.com)
- Advanced OAuth2: Refresh Tokens and Token Expiration Strategies (igventurelli.io)
- Does OAuth2 have a usability problem? (yes!) (evertpot.com)
- OAuth 2.0 Threat Model and Security Considerations (www.rfc-editor.org)