<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: Twitter is wrong: should not drop httpS basic auth	</title>
	<atom:link href="/2010/06/11/twitter-is-wrong-should-not-drop-https-basic-auth/feed/" rel="self" type="application/rss+xml" />
	<link>/2010/06/11/twitter-is-wrong-should-not-drop-https-basic-auth/</link>
	<description>Fucked Up Beyond All Recognition</description>
	<lastBuildDate>Sat, 11 Dec 2010 20:24:01 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>
		By: Identi.ca Updates for 2010-06-12 &#171; FU-BAR		</title>
		<link>/2010/06/11/twitter-is-wrong-should-not-drop-https-basic-auth/comment-page-1/#comment-1185</link>

		<dc:creator><![CDATA[Identi.ca Updates for 2010-06-12 &#171; FU-BAR]]></dc:creator>
		<pubDate>Sun, 13 Jun 2010 02:25:10 +0000</pubDate>
		<guid isPermaLink="false">/?p=867#comment-1185</guid>

					<description><![CDATA[[...] read my analysis here: /2010/06/11/twitter-is-wrong-should-not-drop-https-basic-auth/ [...]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] read my analysis here: <a href="/2010/06/11/twitter-is-wrong-should-not-drop-https-basic-auth/" rel="nofollow ugc">/2010/06/11/twitter-is-wrong-should-not-drop-https-basic-auth/</a> [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Tweets that mention Twitter is wrong: should not drop httpS basic auth « FU-BAR -- Topsy.com		</title>
		<link>/2010/06/11/twitter-is-wrong-should-not-drop-https-basic-auth/comment-page-1/#comment-1183</link>

		<dc:creator><![CDATA[Tweets that mention Twitter is wrong: should not drop httpS basic auth « FU-BAR -- Topsy.com]]></dc:creator>
		<pubDate>Fri, 11 Jun 2010 13:33:31 +0000</pubDate>
		<guid isPermaLink="false">/?p=867#comment-1183</guid>

					<description><![CDATA[[...] This post was mentioned on Twitter by Rui Seabra, Dino Morelli. Dino Morelli said: RT @RuiSeabra New blog post: Twitter is wrong: should not drop httpS basic auth http://ur1.ca/06tno [...]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] This post was mentioned on Twitter by Rui Seabra, Dino Morelli. Dino Morelli said: RT @RuiSeabra New blog post: Twitter is wrong: should not drop httpS basic auth <a href="http://ur1.ca/06tno" rel="nofollow ugc">http://ur1.ca/06tno</a> [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Rui Seabra		</title>
		<link>/2010/06/11/twitter-is-wrong-should-not-drop-https-basic-auth/comment-page-1/#comment-1182</link>

		<dc:creator><![CDATA[Rui Seabra]]></dc:creator>
		<pubDate>Fri, 11 Jun 2010 13:20:26 +0000</pubDate>
		<guid isPermaLink="false">/?p=867#comment-1182</guid>

					<description><![CDATA[I have no problem with the need to register, I have a problem with implementing a complex and useless &quot;fake security&quot; method that then others can exploit in my behalf to do harm to others in my name.

I have a problem, also, that Twitter wants to make that mandatory from June 30 onwards.]]></description>
			<content:encoded><![CDATA[<p>I have no problem with the need to register, I have a problem with implementing a complex and useless &#8220;fake security&#8221; method that then others can exploit in my behalf to do harm to others in my name.</p>
<p>I have a problem, also, that Twitter wants to make that mandatory from June 30 onwards.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Luciano Rocha		</title>
		<link>/2010/06/11/twitter-is-wrong-should-not-drop-https-basic-auth/comment-page-1/#comment-1181</link>

		<dc:creator><![CDATA[Luciano Rocha]]></dc:creator>
		<pubDate>Fri, 11 Jun 2010 12:14:12 +0000</pubDate>
		<guid isPermaLink="false">/?p=867#comment-1181</guid>

					<description><![CDATA[Ah, I see. You don&#039;t want to have to request a key for your application, and then have that key visible to the world. Well, if you must have an approved app key before doing the auth, then that&#039;s useless for non-web apps.]]></description>
			<content:encoded><![CDATA[<p>Ah, I see. You don&#8217;t want to have to request a key for your application, and then have that key visible to the world. Well, if you must have an approved app key before doing the auth, then that&#8217;s useless for non-web apps.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Rui Seabra		</title>
		<link>/2010/06/11/twitter-is-wrong-should-not-drop-https-basic-auth/comment-page-1/#comment-1180</link>

		<dc:creator><![CDATA[Rui Seabra]]></dc:creator>
		<pubDate>Fri, 11 Jun 2010 12:01:24 +0000</pubDate>
		<guid isPermaLink="false">/?p=867#comment-1180</guid>

					<description><![CDATA[It&#039;s not about user security, it&#039;s about application security. oauth/xauth is bullshit security for client applications.]]></description>
			<content:encoded><![CDATA[<p>It&#8217;s not about user security, it&#8217;s about application security. oauth/xauth is bullshit security for client applications.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Luciano Rocha		</title>
		<link>/2010/06/11/twitter-is-wrong-should-not-drop-https-basic-auth/comment-page-1/#comment-1179</link>

		<dc:creator><![CDATA[Luciano Rocha]]></dc:creator>
		<pubDate>Fri, 11 Jun 2010 11:46:00 +0000</pubDate>
		<guid isPermaLink="false">/?p=867#comment-1179</guid>

					<description><![CDATA[From the xauth page:

This one method then returns you the authorised access tokens in the same way the same method does for OAuth. You should store the tokens as they do not expire, and reuse the tokens for any subsequent API calls. The password can effectively be forgotten after the authorised access tokens are received (unless you need them for third party sites such as TwitPic etc..).

So it is more secure than plain baisc auth, in that the user credentials aren&#039;t stored by the application, only the negotiated tokens. If they are captured by a third party, that party will be able to impersonate the user as far as posting and reading is concerned. But the fact that only token is stored allows the user to revoke those permissions without worrying about having lost his password.

Regardless, xauth should work also via HTTPS, right?

As far as the user is concerned, a dialog asking for username and password still pops up, but then the negotiation is done without his knowing.]]></description>
			<content:encoded><![CDATA[<p>From the xauth page:</p>
<p>This one method then returns you the authorised access tokens in the same way the same method does for OAuth. You should store the tokens as they do not expire, and reuse the tokens for any subsequent API calls. The password can effectively be forgotten after the authorised access tokens are received (unless you need them for third party sites such as TwitPic etc..).</p>
<p>So it is more secure than plain baisc auth, in that the user credentials aren&#8217;t stored by the application, only the negotiated tokens. If they are captured by a third party, that party will be able to impersonate the user as far as posting and reading is concerned. But the fact that only token is stored allows the user to revoke those permissions without worrying about having lost his password.</p>
<p>Regardless, xauth should work also via HTTPS, right?</p>
<p>As far as the user is concerned, a dialog asking for username and password still pops up, but then the negotiation is done without his knowing.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
