Feb 24, 2017 · 1 min read
Any authenticated mobile app will be sending a token along with requests, which has equivalence to a password and is thus potentially leaked. Logging out and back in should rotate the token.
Any authenticated mobile app will be sending a token along with requests, which has equivalence to a password and is thus potentially leaked. Logging out and back in should rotate the token.