Indiantruly

229 posts

Indiantruly

Indiantruly

@Indiantruly2

Katılım Nisan 2022
92 Takip Edilen4 Takipçiler
Indiantruly retweetledi
Priyank Ahuja
Priyank Ahuja@ahuja_priyank·
Salary doesn't make you rich. I've listed 75 passive income ideas to earn while your sleep. All you need is: - Smartphone/PC - High Speed Internet - 8 hours a day Retweet & Reply "Money" to get it for free [Must be following] so that I will DM you [Only for First 500 People]
English
793
407
685
146.4K
Vishu
Vishu@vishu_memes·
Drop your name! I will make an AI-generated logo for you.
English
4.9K
101
2K
629.5K
Priyank Ahuja
Priyank Ahuja@ahuja_priyank·
My AI side hustle earns me $2,000 weekly. I made a guide to help you make $250 daily. Normally $199, it's FREE today! Like + comment "Send" and I'll DM it to you (must follow me so that I can DM)
Priyank Ahuja tweet media
English
1.7K
159
1.6K
236.5K
Harut
Harut@theharut·
YouTube Video Case Study: Views: 3,5 Million Revenue: $5,000 Cost: $50 Profit: $4950 Want to learn how I did it? Like + Comment ’YT’, and I'll DM you my FULL $5,800 Course FOR FREE! (Must be following)
Harut tweet media
English
402
47
511
58.8K
Indiantruly retweetledi
THE CODE SCIENTIST
THE CODE SCIENTIST@mysticwillz·
You're in a web development interview, and you're asked: "Do you recommend using OAuth or JWT (JSON Web Tokens) for secure user authorization? Explain your authentication approach." Here's how to answer, discussing use cases and how each method works: OAuth: Use Case: OAuth is an excellent choice when you need to enable third-party applications to access user data or perform actions on behalf of users. It's commonly used for scenarios like social login (allowing users to sign in with their existing social media accounts) and for authorizing API access by external clients. How it works: OAuth involves multiple roles: Resource Owner (User): This is the user who owns the data or resources that the third-party app wants to access. Client (Third-party App): The application that seeks access to the user's data. Authorization Server: This server is responsible for verifying the user's identity and managing permissions. Resource Server: This server hosts the user's data and grants access to authorized clients. The OAuth flow allows users to grant permissions to external apps without sharing their actual credentials (e.g., username and password). Instead, it provides a secure and authorized way for apps to access user data. JWT (JSON Web Tokens): Use Case: JWT is ideal for internal authentication and maintaining stateless sessions within your application. It's often used to securely represent user IDs, roles, or other claims in a compact, self-contained format. How it works: JWTs consist of three parts: Header: Contains metadata about the token, like the algorithm used for signing. Payload: Contains claims, which are statements about the user and additional data. These claims are often used to convey user ID, roles, and more. Signature: This is generated using a secret key and is used to verify the authenticity of the token. JWTs are typically issued to a client after successful authentication and can be included in subsequent requests to authorize the user. They are self-contained, meaning all the necessary information is within the token, reducing the need to store session state on the server. Authentication Approach Recommendation: Choose OAuth when your project involves granting access to user data or actions by third-party applications. It's an excellent choice for scenarios where you want to allow external apps to interact with your system securely. Choose JWT for internal authentication and maintaining stateless sessions within your application. It's efficient and secure for managing user sessions, especially within your own ecosystem. Combining Both: In some cases, you might use OAuth for external authentication, such as social login, and then issue a JWT to the client after successful authentication. This approach allows you to leverage the benefits of both methods.
English
8
68
283
20.4K
Indiantruly retweetledi
THE CODE SCIENTIST
THE CODE SCIENTIST@mysticwillz·
You're in a web development interview, and you're asked: "Do you recommend using OAuth or JWT (JSON Web Tokens) for secure user authorization? Explain your authentication approach." Here's how to answer, discussing use cases and how each method works: OAuth: Use Case: OAuth is an excellent choice when you need to enable third-party applications to access user data or perform actions on behalf of users. It's commonly used for scenarios like social login (allowing users to sign in with their existing social media accounts) and for authorizing API access by external clients. How it works: OAuth involves multiple roles: Resource Owner (User): This is the user who owns the data or resources that the third-party app wants to access. Client (Third-party App): The application that seeks access to the user's data. Authorization Server: This server is responsible for verifying the user's identity and managing permissions. Resource Server: This server hosts the user's data and grants access to authorized clients. The OAuth flow allows users to grant permissions to external apps without sharing their actual credentials (e.g., username and password). Instead, it provides a secure and authorized way for apps to access user data. JWT (JSON Web Tokens): Use Case: JWT is ideal for internal authentication and maintaining stateless sessions within your application. It's often used to securely represent user IDs, roles, or other claims in a compact, self-contained format. How it works: JWTs consist of three parts: Header: Contains metadata about the token, like the algorithm used for signing. Payload: Contains claims, which are statements about the user and additional data. These claims are often used to convey user ID, roles, and more. Signature: This is generated using a secret key and is used to verify the authenticity of the token. JWTs are typically issued to a client after successful authentication and can be included in subsequent requests to authorize the user. They are self-contained, meaning all the necessary information is within the token, reducing the need to store session state on the server. Authentication Approach Recommendation: Choose OAuth when your project involves granting access to user data or actions by third-party applications. It's an excellent choice for scenarios where you want to allow external apps to interact with your system securely. Choose JWT for internal authentication and maintaining stateless sessions within your application. It's efficient and secure for managing user sessions, especially within your own ecosystem. Combining Both: In some cases, you might use OAuth for external authentication, such as social login, and then issue a JWT to the client after successful authentication. This approach allows you to leverage the benefits of both methods.
English
13
84
340
27.4K
Indiantruly retweetledi
Deepak Prabhu
Deepak Prabhu@ragiiing_bull·
#bhatnbhat98 on Instagram Authentic drumstick leaves recipe.. 😋😋😋 You can call it Bhakri or Thalipeet too.
English
36
55
316
18.6K
Indiantruly retweetledi
𝕲𝖆𝖓𝖊𝖘𝖍 *
𝕲𝖆𝖓𝖊𝖘𝖍 *@ggganeshh·
This is probably one of the simplest and the best explanation of proteins in Veg food
English
115
956
3.8K
299.4K
Indiantruly retweetledi
vivan.
vivan.@VivanVatsa·
After DEATH of Lord Shiva’s first wife Sati, he lost the desire to love & was only left with anger Shiva in deep pain carried Sati on his shoulders & in grief performed 'Tandava' destroying the universe Vishnu Ji had to use “Sudarshan Chakra” on Shiva to STOP the destruction…
vivan. tweet media
English
228
2.1K
22.8K
2.3M
Indiantruly retweetledi
𝗔𝗵𝗮𝗺 𝗕𝗿𝗮𝗵𝗺𝗮𝘀𝗺𝗶
#Thread | 𝗡𝗮𝘁𝗮𝗿𝗮𝗷𝗮 - 𝗦𝗵𝗶𝘃𝗮 𝗔𝘀 𝗖𝗼𝘀𝗺𝗶𝗰 𝗗𝗮𝗻𝗰𝗲𝗿 𝗥𝗲𝗽𝗿𝗲𝘀𝗲𝗻𝘁𝗶𝗻𝗴 𝗖𝗼𝘀𝗺𝗶𝗰 𝗖𝘆𝗰𝗹𝗲𝘀 𝗼𝗳 𝗖𝗿𝗲𝗮𝘁𝗶𝗼𝗻 & 𝗗𝗲𝘀𝘁𝗿𝘂𝗰𝘁𝗶𝗼𝗻𝘀 ! Read More to Understand Why Scientists Belive Shiva's Dance is the Dance of subatomic matter? [1/N]
𝗔𝗵𝗮𝗺 𝗕𝗿𝗮𝗵𝗺𝗮𝘀𝗺𝗶 tweet media
English
64
733
2.5K
125.9K
Indiantruly retweetledi
vivan.
vivan.@VivanVatsa·
After Hindu Gods were ATTACKED by Raktabija, Gods became weak. Only "Maa Durga" could help them & fight Raktabija. So she took her DEADLIEST avatar & KILLED him, but her BLOODLUST got out of control. Even Shiva couldn't stop her RAGE so he 'surrendered' to save the universe...
vivan. tweet media
English
130
1.7K
15K
1.2M