Hi Denis,

Am 07.11.19 um 09:16 schrieb Denis:
>
>        *Whatever kind of cryptographic is being used, when two users
> collaborate, a software-only solution will be unable to prevent the
> transmission *
> *       of an attribute of a user that possess it to another user that
> does not possess it. *
>
To stay in OAuth lingo, what you are saying is: Two collaborating
clients can exchange their access tokens and use them.

Is that a correct summary of your attack?

-Daniel


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to