KUNTAL MAITYkuntalmaity.hashnode.dev·Nov 5, 2024difference between access token and refresh tokenWhy tokens? Authentication and Authorization are the crucial steps for protecting user data. Hear token based authentication comes into the picture. There are many authentication methodologies are available but took in based authentication is most po...Discussaccess-token
Romman Sabbirrommansabbir.com·Nov 2, 2024Secure User Authentication in Android: A Comprehensive Guide [PART 2]User authentication is one of the most critical security aspects of any mobile application. Implementing secure authentication methods ensures that users’ data and accounts are protected from unauthorized access. In this article, we will dive deep in...Discuss·40 readsAndroid : Security, Encryption and Secure PracticesAndroid
Venkate Exchangevenkate-research.hashnode.dev·Oct 31, 2024What Are Token Standards?Why Follow Token Standards? Interoperability Token standards ensure that all products built on the same framework can interact and work together seamlessly. When a project's tokens adhere to a unified standard, newly issued tokens can remain compatib...DiscussCryptocurrency
Aries TriputrantoforAriesTriputrantoaariestriputranto.hashnode.dev·Oct 27, 2024Respons 403Request URL: https://api.github.com/repos/AriesTriputranto/chromium-dashboard/hook Request method: POST Accept: */* Content-Type: application/json User-Agent: GitHub-Hookshot/c0ace7e X-GitHub-Delivery: 42729de0-92ad-11ef-89ca-38e0fe43b59c X-GitHub-Ev...Discussurl req
Victor Uzoagbavictoru.hashnode.dev·Oct 25, 2024Tokenization of Real-World Assets Beyond Digital ArtIn the financial world, tokenization is already in place-mostly beyond anything one could relate to with digital art or collectibles. Blockchain technology opens up greater avenues for the global tokenization market to reach a value of $24 trillion b...DiscussTokenization
AMITfuture-stack.hashnode.dev·Oct 23, 2024How Access and Refresh Tokens Work in User Authentication?In today’s digital landscape, authentication is the backbone of secure web and mobile applications. Whether you’re signing into a social media platform or accessing a cloud service, the system needs to verify your identity and determine what resource...Discussrefresh-token
Zainab Wahabzainabwahab.hashnode.dev·Oct 14, 2024What is ERC-20 and How Do Its Functions Define Fungible Tokens?Introduction to ERC-20 Tokens ERC-20 tokens are fungible digital assets that exist on the Ethereum blockchain. A fungible token means that each token unit is identical and interchangeable with another. This is similar to fiat currencies, where each $...Discuss·6 likes·27 readsEthereum
Pranav Podutwarpranavdevelops.hashnode.dev·Oct 6, 2024Mastering Distributed Locks: Consistency using Fencing TokensContinuing from learnings from previous blog on tackling the thundering herd problem, which discussed the viral incident where 13 million people attempted to book Coldplay tickets, it’s clear that such high-demand events shows the need for distribute...Discuss·79 readsdistributed system
Himanshuraj Tiwariaccess-and-refresh-token-himanshu2918.hashnode.dev·Sep 29, 2024Access Token And Refresh TokenThe access token and refresh token and most commonly used technique for authentication. So let discuss more about this What is access token ? Access Tokens are short-lived tokens used to authenticate users. When a user logs into a web page, we set th...DiscussWeb Development
Ethan Oliverethanoliver.hashnode.dev·Sep 19, 2024Why Tokenization is Paving the Way for Blockchain’s FutureIntroduction As the technology of blockchain evolved after the development of Bitcoin, many breakthroughs have been made with tokenization being one of them. Tokenization is disrupting the handling of digital assets and making a revolutionary impact ...DiscussTokenization