Security Cryptography Whatever cover image

What do we do about JWT? with Jonathan Rudenberg

Security Cryptography Whatever

00:00

Acquisition and Identity Protocols

This chapter explores a significant $3 billion company acquisition and its impact on secure identity protocols like OIDC and JWT. The conversation covers the complexities of implementing OIDC, the evolution of OAuth, and the importance of understanding these protocols to mitigate vulnerabilities in identity verification.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app