in the former explanation, the thing that is missing is how can your action 
be aware of a "malicious" POST or a valid one. 
Since you have an hard requirement on no authentication, I don't see 
anything that would make your counters "solid".
The next best thing to do is to "salt" whatever variable you find more 
suitable in the javascript piece and verify that the "salted variable" 
matches when you receive that POST. Kinda of an "expiring" link that serves 
no longer if the POST comes, let's say, a minute after the javascript piece 
has been generated. That won't be a silver-bullet but it'll stop the 
easiest "malicious" from screwing with your counters.

-- 
Resources:
- http://web2py.com
- http://web2py.com/book (Documentation)
- http://github.com/web2py/web2py (Source code)
- https://code.google.com/p/web2py/issues/list (Report Issues)
--- 
You received this message because you are subscribed to the Google Groups 
"web2py-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to