does t5's form generation hmac stuff lend itself to this non predictable
task?

Digressing a bit,
A log would show nuisances taking guesses.  At the extreme scale of
sensitive info and network architecture, the cat can be skinned at the
network(ing layer).

On 05/02/2014 10:06 pm, "Lance Java" <lance.j...@googlemail.com> wrote:

> If we were to use a token, care would need to be taken with token
> generation such that it's not predictable. We don't want hackers
> intercepting sensitive data meant for another client.
>

Reply via email to