Back to the Future: Hacking and Securing Connection-based OAuth Architectures

Click a thumbnail to watch in a lightweight modal. (No downloads — view only.)