On 4/23/09 8:30 PM, Brian Eaton wrote: > Malicious software on the user's computer does not need to steal > access tokens. It steals passwords, bank account numbers, and > confidential documents.
Sure. But, this attack can happen when the victim is NOT running malicious software! That's why this is a serious threat. -- Dossy Shiobara | [email protected] | http://dossy.org/ Panoptic Computer Network | http://panoptic.com/ "He realized the fastest way to change is to laugh at your own folly -- then you can let go and quickly move on." (p. 70) --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "OAuth" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/oauth?hl=en -~----------~----~----~----~------~----~------~--~---
