Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You can also require users to be authenticated (through SSO or other mechanism) before they log in, which could defeat some impersonation attempts.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: