I have yet to see an Operating System that handles identity and access control in an intelligent way. It’s tragic that the best answer we have to “how do I know that this request came from a legitimate source” is, roughly: passwords, API tokens, OAuth, Kerberos, or TLS. We can and should do better.
=> More informations about this toot | View the thread | More toots from jpf@mastodon.social
text/gemini
This content has been proxied by September (3851b).