The OWASP Podcast Series cover image

Giving a jot about JWTs: JWT Patterns and Anti-Patterns - OWASP Podcast e002

The OWASP Podcast Series

00:00

Is Redic a Good Implementation for Revocation?

You can write really rugged c, but you can also write c that has bleeds o memory all over the place. Yet, just complexity that that never helps security as general rule. I would tend to run away absently. What's whatr the good whan is a good implementation if i want to do this right? The pattern verses our anti pattern? Yes, we talk about revocation a little bit.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app