intro This is, perhaps unsurprisingly, another article on ft. Maybe, it will be the last one since the project is wrapping up quite nicely and the original roadmap has been pretty much fulfilled.
In this article, I’ll go over the simple authentication method on ft and the reasoning behind such an authentication system.
authentication systems cause ruin In my opinion, a lot of the attack vectors happen at the authentication level.