Programming Throwdown cover image

117 - Authentication with Aviad Mizrachi

Programming Throwdown

00:00

Authentication

Most of the attacks, at least i see in the news, are things where the authentication system has been compromised. And so it seems like a great thing to build yo kind of service around. But there's so many different intricacies to it. There's no social law gin. There's login through a phone number. There're no email and password, anenough to verify the email. All that stuff is just adds so much complexity to the developer experience.

Play episode from 04:36
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app