Skip to content
Better HN
Top
New
Best
Ask
Show
Jobs
Search
⌘K
undefined | Better HN
0 points
martinko
3y ago
0 comments
Share
> I feel like a hash of the contents + some secret bytes could be a convincing signature that only the owners of the secret bytes could author.
How would you validate the signature?
0 comments
default
newest
oldest
noodlesUK
3y ago
Parent is describing a keyed HMAC scheme. JWTs sometimes use them, but key management is a massive PITA.
j
/
k
navigate · click thread line to collapse