4 Comments

Great post, nice breakdown and explanation!

But what happens when someone can eavesdrop on the signed token link? Let's say your email server is not great or doesn't encrypt and you're on starbucks network.

Expand full comment

Great article and thanks for the mention Marco!

Expand full comment