Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Not necessarily. There is no big difference whether the business logic resides in the same node process or another one. If the first process is unsafe on that level, then the token can also be extracted.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: