A while ago an application we’ve been working on was submitted to a penetration test during which a possibility of man in the middle attack was exploited. We then embarked on a journey to find the best solutions & stumbled upon multiple options so we...
stack-overflowed.hashnode.dev4 min readNo responses yet.