On Wed, May 13, 2009 at 4:51 AM, Paul Lindner <lind...@inuus.com> wrote:
> Moving the security token to the hash does not fix this problem.  You will
> still leak that information.

Yoichiro is right, the security token does not leak in the referer if
it is placed in the fragment.

One fix for this is to pass a short-lived security token in the URL (1
minute, say) and return a long-lived security token in the body of the
page.  If you implement a custom security token decoder in shindig
it's pretty easy to do this, just implement
SecurityToken.getUpdatedToken.

Reply via email to