Another question: how does the server validate the identity/authenticity of the 
client? In other words, what does a malicious app prevent from using the URL 
and server of another native app?

Regards,
Torsten.
Gesendet mit BlackBerry® Webmail von Telekom Deutschland  

-----Original Message-----
From: [email protected]
Sender: [email protected]
Date: Wed, 5 Jan 2011 06:15:23 
To: <[email protected]>
Reply-To: [email protected]
Cc: <[email protected]>; Karen P. Lewison<[email protected]>
Subject: Re: [OAUTH-WG] unregistered applications

_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to