You might want to have a plan for changing your account, in case an
attacker gains access to it. Your response would be to login to
another account, authorize your application to upload to it and
reconfigure your application to use the new access token and secret.

On the other hand, this might be unnecessary. Perhaps there's nothing
harmful such an attacker could do.
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to [email protected]
For more options, visit this group at http://groups.google.com/group/oauth?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to