Security Cryptography Whatever cover image

What do we do about JWT? with Jonathan Rudenberg

Security Cryptography Whatever

00:00

Navigating JWT Complexities

This chapter explores the intricacies of using JSON Web Tokens (JWT) for authentication, emphasizing the importance of secure implementation and potential vulnerabilities. It critiques design flaws and highlights the challenges associated with different cryptographic algorithms and modes of deployment. The discussion also considers alternative approaches to JWT, weighing their benefits and situations where simpler solutions may be preferable.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app