Secure Your APIs (Part 1) : Leakage and Proxying
API Leakage
Everybody uses APIs in their applications but did you know that your API request might contain sensitive information which you might not wanna share with others, such as API keys/tokens.
API keys/tokens are a way in which you can authoriz...
chinmaypandya.hashnode.dev4 min read