Vulnerabilities in Authentication with JWT
After working with JWT more in-depth for the past few months, I realized most of the learning materials are of poor quality.
Today, I want to make it clear how JWT should be used in your authentication flow, what are its security vulnerabilities, and...
blog.scalablebackend.com7 min read
Aurelien Brachet
react
Thank you for this insightful article. A must read for all full stack developers.