Common passwordless authentication method - Edition #17
Great post, nice breakdown and explanation!
But what happens when someone can eavesdrop on the signed token link? Let's say your email server is not great or doesn't encrypt and you're on starbucks network.
Great article and thanks for the mention Marco!
Great post, nice breakdown and explanation!
But what happens when someone can eavesdrop on the signed token link? Let's say your email server is not great or doesn't encrypt and you're on starbucks network.
Great article and thanks for the mention Marco!