Rate Limiting, Abuse, and Trust at Scale
In the last two articles, we solved some big problems. We know who the user is (Authentication) and we know what they are allowed to do (Authorization).
At this point, you might feel like your backend is a fortress. The doors are locked, and the guar...
thinking-in-backend.hashnode.dev4 min read