Hacker News new | past | comments | ask | show | jobs | submit login

This may not offer much advice for your particular application, but may at least show you how NOT to handle authentication. Its the best resource on the subject I've seen thus far [PDF]:

http://pdos.csail.mit.edu/papers/webauth:sec10.pdf




That is a pretty good paper. I haven't gone through it in full detail, but the sections I read were excellent. Thanks!


Thanks for this link!




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: