JWTs are insecure session tokens Published 2024-05-10 Download video MP4 360p Download video MP4 720p Recommendations 31:50 `const` was a mistake 15:58 Authentication is a developer nightmare 16:40 Why did we Abandon 4:3? | Nostalgia Nerd 33:33 why do they do this every time? 10:28 I GOT PUNCHED in the FACE... and I Switched to Godot 09:47 Your backend is too complicated 30:40 Why are so many Crypto Millionaires Mysteriously Dying? 18:34 How to Stalk People Effectively and Legally Through OSINT 45:05 DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards - Bertocchi, Campbell, Gibson, Harris 14:39 The cloud is over-engineered and overpriced 10:25 The purest coding style, where bugs are near impossible 13:12 reverse engineering makes you a better programmer (letβs try it out) 06:33 How I deploy serverless containers for free 12:58 Using docker in unusual ways 44:59 I Investigated Why British Cities Keep Going Bankrupt 21:33 Comparing 10 programming languages. I built the same app in all of them. 55:41 Connor Leahy Unveils the Darker Side of AI 05:14 Why is JWT popular? 11:37 The best (and worst) types for storing money in PostgreSQL 14:39 The cloud is over-engineered and overpriced (no music) Similar videos 14:14 JSON Web tokens vs sessions for authentication | should you use JWTs as session tokens? 06:30 JSON Web Token Hacking 23:33 Stop using JSON Web Tokens. Use Cookies & Server Sessions instead 07:14 Why I haven't been using JWT tokens for Authentication 14:34 Cracking JSON Web Tokens 05:34 Does Storing JWT's In HTTP Only Cookies Stop XSS Attacks 53:14 JSON Web Tokens Suck 23:16 Deep dive into self-contained tokens and JWTs 07:25 How to Exploit "Json Web Token"(JWT) vulnerabilities | Full Practical 52:51 JSON Web Tokens Suck - Randall Degges (DevNet Create 2018) 01:00 What are Refresh Tokens?! πβ 46:41 Cookies, Sessions, JSON Web Tokens (JWT) and More πͺπ 24:56 Handling JWTs: Understanding Common Pitfalls - Bruce MacDonald, InfraHQ 27:52 The Hacker's Guide to JWT Security 34:59 Attacks on JSON Web Tokens: A Comprehensive Analysis by Chesleah Kribs 01:00 Refresh Tokens - The Insecurity of OAuth 2.0 in Frontends #programming #coding 28:01 Attacking and Securing JWTs with Rana Khalil 13:15 How Hackers Hack JSON Web Tokens 22:22 Apidays New York 2023 - API Authentication Deep Dive: OAuth 2.0, Tokens, and JWTs More results