Shuka Zubaidatshukazuby.hashnode.dev·Jan 5, 2025How to Properly Implement Face ID in Your App: Lessons from a Real-Life Testing ExperienceFace ID is one of the most innovative biometric authentication methods, providing users with both convenience and security. However, while testing an app recently, I noticed significant flaws in its Face ID integration that revealed potential securit...27 likes·61 readsFace ID
Smit Bhoraniyasmit-bhoraniya.hashnode.dev·Jul 15, 2023The Power of Access Tokens and Refresh Tokens: A Guide to Secure AuthenticationA token is a piece of data that serves as a representation or proof of authorization. It is typically used to authenticate and validate the identity of a user or a client application in order to grant access to certain resources or perform specific a...10 likes·78 readsaccess-token
Aditya Chaudhariwww.adityatechinsights.com·Jul 8, 2023Why Should I Care About OAuth 2.0? Understand important components in OAUTH2.0 .You've probably heard of OAuth 2.0, but have you ever wondered why it's become such a big deal and how it solves some of our authentication headaches? let's dive into it together! OAuth 2.0 is someone like a loyal mediator that allows different parti...176 readsSystem Design InsightsOAuth2