Sublime
An inspiration engine for ideas
building trust
Natalie Audelo • 12 cards
The other method is to do some kind of network analysis. This is broadly the approach that ssb uses - here independent parties post "follow" messages which bring that peer into your network. https://www.stellar.org/ is anothe example of this approach. For a voting system, you could have each peer state who they accept the votes of, and discount... See more
Gossip · GitBook
UX
Bawa • 7 cards
It's hard to go into depth since this is an arms race situation. At a high-level though, aside from hardening your auth, there are 4 things you can do:
1) Use a rate limiter against IP and user ids
2) Block traffic from bad acting nation states
3) Only allow requests from real... See more
Jared Palmerx.comI’d like to see a credential management system that solves this problem, making it as easy to share access to infrastructure as it is to give “Comment” or “Edit” access on a Google Doc.
Mario Gabriele • Not Found
"How do I roll my own auth with Next.js?"
Check out The Copenhagen Book for guidance https://t.co/YHAHLklZhv
Alex Sidorenkox.comFound the BEST auth library for Astro apps! - devlog 4
🔒🚀 Lucia-auth
• GitHub oauth feat. typesafe middleware
• Own the users table https://t.co/eXaQxaVl6U
Ben Holmesx.comWeb3 Programming
Marcel Mairhofer • 1 card