recentpopularlog in

edhill : security   31

Compromising Twitter's OAuth security system
onsumer secret. To make matters worse, Twitter intends to systematically invalidate compromised keys. This means that when somebody extracts the key from a popular desktop Twitter client and publishes it on the Internet, Twitter will revoke access to the service for that client application. All of the users who rely on the compromised program will be locked out and will have to use other client software or the Twitter website in order to access the service.
twitter  security  oauth  api 
september 2010 by edhill
IT-Security Office
The University of Iowa IT Security Office, promoting secure information technology systems, services, and programs.
its  security 
march 2010 by edhill

Copy this bookmark:

to read