does t5's form generation hmac stuff lend itself to this non predictable task?
Digressing a bit, A log would show nuisances taking guesses. At the extreme scale of sensitive info and network architecture, the cat can be skinned at the network(ing layer). On 05/02/2014 10:06 pm, "Lance Java" <lance.j...@googlemail.com> wrote: > If we were to use a token, care would need to be taken with token > generation such that it's not predictable. We don't want hackers > intercepting sensitive data meant for another client. >