Another question: how does the server validate the identity/authenticity of the client? In other words, what does a malicious app prevent from using the URL and server of another native app?
Regards, Torsten. Gesendet mit BlackBerry® Webmail von Telekom Deutschland -----Original Message----- From: [email protected] Sender: [email protected] Date: Wed, 5 Jan 2011 06:15:23 To: <[email protected]> Reply-To: [email protected] Cc: <[email protected]>; Karen P. Lewison<[email protected]> Subject: Re: [OAUTH-WG] unregistered applications _______________________________________________ OAuth mailing list [email protected] https://www.ietf.org/mailman/listinfo/oauth _______________________________________________ OAuth mailing list [email protected] https://www.ietf.org/mailman/listinfo/oauth
