Thanks Jonathan,

I fully agree with the article except on the fact that OAuth2.0 will
solve all problems, OAuth2.0 is simpler (less weird options) so will
solve problems with application bugs, but I fear that problems with
the flow (such as phishing) could persist.

Aside from twitter's own problems the goal of web2py's oauth1.0a
implementation is to stick as much to the RFC, not twitter's.
Please remember  that a *web2py application package distribution must
not contain secrets of any sort!*.
Since web2py is not a "desktop" application there is *no need to
distribute secrets* to third parties.

I think that web2py allowed to make a very simple implementation, so
bugs should be kept to a minimum, and code is  less
than 400 lines, so anyone can read it and find errors.

tnx
mic

2010/9/11 Jonathan Lundell <[email protected]>:
> Folks playing with Twitter OAuth might care to read this: 
> http://arstechnica.com/security/guides/2010/09/twitter-a-case-study-on-how-to-do-oauth-wrong.ars/
>
>

Reply via email to