Hacker News new | past | comments | ask | show | jobs | submit login

Great answer. One thing I'd like to add is if you're using bearer tokens, make sure your API has an easy way to invalidate and regenerate them, as anyone with the bearer token has full access.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: