Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> What have you blocked the attacker from doing?

Not blocked necessarily, but if they want to leverage a stolen token, they’re now forced down a more difficult and highly visible pathway.

You can imagine anomaly detection along the lines if “hey your rails app just made a type of request that it has never made before”, but even just monitoring the metrics of the proxy could tip you off if something is going on.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: