Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

See the Cryptographic Control Over Data Access [0] section here for one answer to this problem.

[0] https://cloud.google.com/blog/products/identity-security/new...



That's nice, but the only reasons that public clients would use a well known bad actor from a rogue state is laziness / incompetence.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: