₿.

377 posts

₿. banner
₿.

₿.

@briac_dev

Talk about dev, saas, seo, sec https://t.co/RsxX1hFrev https://t.co/hWRICNs2lq [email protected]

Entrou em Ekim 2019
213 Seguindo37 Seguidores
₿.
₿.@briac_dev·
English
0
0
1
10
Stella | Indie hacker
Stella | Indie hacker@StellaSLcode·
Qui a testé le traducteur d'openAI (apparemment pas eux en tout cas 🤣) ?
Stella | Indie hacker tweet media
Français
1
0
2
269
₿.
₿.@briac_dev·
@VadimStrizheus splorix.com scans your infrastructure in real time to detect, prioritize, and fix security vulnerabilities with clear and actionable results. It also monitors domains similar to yours in real time so you can detect phishing & nuisance attempts before your users do.
₿. tweet media
English
0
0
2
111
Vadim
Vadim@VadimStrizheus·
Happy Monday Founders! Share what you’re building this week. 👇
Vadim tweet media
English
270
3
160
11.5K
₿.
₿.@briac_dev·
@1Umairshaikh splorix.com scans your infrastructure in real time to detect, prioritize, and fix security vulnerabilities with clear and actionable results. It also monitors domains similar to yours in real time so you can detect phishing & nuisance attempts before your users do.
₿. tweet media
English
0
0
1
41
Umair Shaikh
Umair Shaikh@1Umairshaikh·
What are you building this week? Drop your project URL Let’s drive some traffic
English
402
9
219
16.7K
₿.
₿.@briac_dev·
Splorix is now LIVE! 🚀 Looking for beta testers to: ✔️ Test the platform ✔️ Find bugs ✔️ Share feedback & advice Splorix scans your infrastructure in real time to detect, prioritize, and fix security vulnerabilities with clear and actionable results. It also monitors domains similar to yours in real time so you can detect phishing & nuisance attempts before your users do. Completely free, no credit card required! ✅ 👉 Want to help? DM me and go to splorix.com
₿. tweet media
English
0
0
3
82
Bart ⚡
Bart ⚡@bzagrodzki·
Giving away backlinks Drop your website below 👇
Bart ⚡ tweet media
English
388
2
166
20K
₿.
₿.@briac_dev·
JWT Alternatives: When Not to Use JWTs JWTs aren’t always the best choice. Consider alternatives when: ❌ You need to revoke tokens early (JWTs are stateless; revocation requires a blacklist). ❌ You’re dealing with highly sensitive data (use encrypted tokens like JWE instead). ❌ You need fine-grained permissions (consider OAuth2 + opaque tokens).
English
1
0
1
22
₿.
₿.@briac_dev·
JWT Security Best Practices JWTs are powerful, but misconfigurations can lead to major vulnerabilities. Here’s how to stay safe: ✅ Never hardcode secrets in your code (use environment variables). ✅ Rotate keys periodically (especially if a breach is suspected). ✅ Use strong keys (2048+ bits for RSA, 256+ bits for ECDSA). ✅ Always set an exp claim (short-lived tokens are safer). ✅ Use refresh tokens for long-lived sessions (instead of extending JWT expiry). ✅ Avoid localStorage (vulnerable to XSS). ✅ Prefer HttpOnly cookies (protects against XSS). ✅ Use Secure and SameSite flags for cookies. ✅ Always verify the signature before trusting a JWT. ✅ Check standard claims (exp, iss, aud). ✅ Reject tokens with alg: none (no signature = insecure!).
English
2
0
2
25
₿.
₿.@briac_dev·
How to Read & Debug JWTs with jwt.io jwt.io is a must-use tool for JWT debugging. Here’s how to use it: 1️⃣ Paste your JWT into the left panel. 2️⃣ Decoded Header & Payload appear on the right. 3️⃣ Verify the signature: For HS256: Enter the secret key. For RS256: Enter the public key (PEM format). ⚠️ Never paste production JWTs into public tools unless you’re okay with them being decoded..
English
1
0
0
12
₿.
₿.@briac_dev·
Symmetric vs. Asymmetric Signing: HS256 vs. RS256 JWTs can be signed in two ways: 1. Symmetric (HMAC - HS256, HS384, HS512) Uses a single shared secret key for signing and verification. 👍 Fast (less computational overhead) and simple to implement. 👎 If the key leaks, attackers can forge tokens. Not ideal for microservices (every service needs the same key). 2. Asymmetric (RSA - RS256, RS384, RS512 / ECDSA - ES256) Uses a private key (to sign) and a public key (to verify). 👍 More secure (private key stays secret). Better for distributed systems (only the auth server needs the private key). 👎 Slower (more computational overhead) and requires key management.
English
1
0
1
18
₿.
₿.@briac_dev·
The Signature: How JWTs Stay Secure The signature is what makes JWTs trustworthy. It’s generated by: Taking the Base64Url-encoded header + payload. Signing it with a secret key (symmetric) or private key (asymmetric). If the token is modified, the signature won’t match → rejected by the server. Example (HS256) :
₿. tweet media
English
1
0
0
21
₿.
₿.@briac_dev·
🧵 [THREAD] JWT (JSON Web Tokens) Explained: Secrets, Public/Private Keys & jwt.io JWTs are the backbone of modern authentication. But how do they really work? Let’s break down: ✅ How JWTs are structured ✅ Symmetric vs. asymmetric signing (HS256 vs. RS256) ✅ How to read & debug JWTs with jwt.io ✅ Security best practices Let’s dive in! 👇
English
1
0
2
44
₿.
₿.@briac_dev·
Payload (Base64Url decoded): - sub: Standard claim for user identification. - iat: When the token was issued. - exp: Expiration time (not in this example, but critical!).
₿. tweet media
English
1
0
0
5
₿.
₿.@briac_dev·
Decoding a JWT: Header & Payload Let’s decode the example above: Header (Base64Url decoded): - alg: Algorithm used for signing (HS256 = HMAC-SHA256). - typ: Token type (JWT).
₿. tweet media
English
1
0
0
9
₿.
₿.@briac_dev·
JWTs 101: The Basics A JSON Web Token (JWT) is a compact, URL-safe way to transmit data between parties as a JSON object. It’s signed, meaning you can verify its integrity. A JWT has 3 parts, separated by dots (.): 1️⃣ Header – Contains the algorithm (alg) and token type (typ). 2️⃣ Payload – Contains "claims" (user data, expiration, etc.). 3️⃣ Signature – Ensures the token hasn’t been tampered with. Example: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c
English
1
0
0
9
Kylian Khalifa
Kylian Khalifa@kylian_khalifa·
Ce mois de janvier est le dernier mois où je serai seul à piloter la croissance de @taap__it Le 1er février, @taap__it aura un CMO On va encore une fois réaliser de loin notre meilleur mois, on va sûrement finir à plus de 30 000 $ Le momentum commence L’avantage avec le momentum dans le software, c’est qu’il ne s’arrête jamais quand t’as bien bossé tes bases (ton produit) Vous verrez que maintenant, tout va nous réussir Tout va paraître « simple » La vérité, c’est que j’ai tout fait pour provoquer ce moment Ce qui va se passer n’est que le résultat de tous les intérêts composés accumulés avec le temps, et le paiement de tout le focus qu’on a gardé durant ces derniers mois On a gagné cette première bataille En bootstrappant Et qu’avec du produit Maintenant, on va faire du vrai marketing, on va distribuer ce produit, on va le monétiser, le vendre Et ne pas faire l’erreur que font tous les fondateurs qui ont la chance d’avoir un produit viral en product-led growth : se contenter uniquement de lui pour grossir Le vrai travail commence maintenant 🏴‍☠️
Français
5
0
43
5K
₿.
₿.@briac_dev·
Big news! Two projects are coming your way VERY soon. 👀 Free beta access to try them first, who’s ready?
₿. tweet media
English
2
0
6
48
₿.
₿.@briac_dev·
API key management made simple & scalable Built with Nuxt 4 What do you think? 👇 #Dev @Nuxt
English
0
0
3
78
₿.
₿.@briac_dev·
Claude Code + Ollama Cloud = pure coding joy. No limits, smooth dev, and time for coffee ☕✨
English
0
0
0
16