Tag: OAuth

  • Hacker News: Refresh vs. Long-lived Access Tokens (2023)

    Source URL: https://grayduck.mn/2023/04/17/refresh-vs-long-lived-access-tokens/ Source: Hacker News Title: Refresh vs. Long-lived Access Tokens (2023) Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses the differences between long-lived access tokens and a combination of long-lived refresh tokens with short-lived access tokens, particularly in the context of OAuth 2.0. It highlights the security benefits of…

  • CSA: How Can You Strengthen Google Workspace Security?

    Source URL: https://www.valencesecurity.com/resources/blogs/why-application-specific-passwords-are-a-security-risk-in-google-workspace Source: CSA Title: How Can You Strengthen Google Workspace Security? Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the security risks related to Application-Specific Passwords (ASPs) in Google Workspace, emphasizing their vulnerabilities and the need for stronger authentication methods. It provides practical security tips to mitigate the risks associated…

  • Hacker News: Generative AI Has an E-Waste Problem

    Source URL: https://spectrum.ieee.org/e-waste Source: Hacker News Title: Generative AI Has an E-Waste Problem Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a significant increase in private investment in generative AI and its substantial impact on the production of electronic waste (e-waste), particularly focusing on large language models (LLMs). It highlights the…

  • Hacker News: Auth Wiki

    Source URL: https://auth.wiki/ Source: Hacker News Title: Auth Wiki Feedly Summary: Comments AI Summary and Description: Yes Summary: The provided text comprehensively discusses various access control mechanisms, emphasizing their importance in security practices and the management of identities and permissions. These topics are highly relevant for professionals in security, particularly concerning identity and access management…

  • Hacker News: Eartho: Open-Source, Privacy-Focused Alternative to Google Sign-In

    Source URL: https://github.com/eartho-group/eartho Source: Hacker News Title: Eartho: Open-Source, Privacy-Focused Alternative to Google Sign-In Feedly Summary: Comments AI Summary and Description: Yes Summary: Eartho is an open-source authentication solution that emphasizes user privacy by acting as a layer between users and major authentication providers like Google and Facebook. This unique setup not only protects user…

  • CSA: Why Is Google Ending Support for Less Secure Apps?

    Source URL: https://cloudsecurityalliance.org/articles/app-specific-passwords-origins-functionality-security-risks-and-mitigation Source: CSA Title: Why Is Google Ending Support for Less Secure Apps? Feedly Summary: AI Summary and Description: Yes Summary: Google’s announcement to terminate support for Less Secure Apps (LSAs) highlights the importance of App-Specific Passwords (ASPs) and the lingering security concerns they carry. This transition marks a significant improvement in user…

  • Simon Willison’s Weblog: Grant Negotiation and Authorization Protocol (GNAP)

    Source URL: https://simonwillison.net/2024/Oct/14/grant-negotiation-and-authorization-protocol-gnap/#atom-everything Source: Simon Willison’s Weblog Title: Grant Negotiation and Authorization Protocol (GNAP) Feedly Summary: Grant Negotiation and Authorization Protocol (GNAP) RFC 9635 was published a few days ago. GNAP is effectively OAuth 3 – it’s a newly standardized design for a protocol for delegating authorization so an application can access data on your…

  • Simon Willison’s Weblog: OAuth from First Principles

    Source URL: https://simonwillison.net/2024/Sep/5/oauth-from-first-principles/#atom-everything Source: Simon Willison’s Weblog Title: OAuth from First Principles Feedly Summary: OAuth from First Principles Rare example of an OAuth explainer that breaks down why each of the steps are designed the way they are, by showing an illustrative example of how an attack against OAuth could work in absence of each…