Closed skatsikeas closed 2 years ago
I think we can! This is close to what Max did in the OAuth test model. He used two Credential
instances and one Data
. The (hashed) Credentials
are contained inside Data
and Data
is in turn encrypted using the other Credential
instance which is the hashing key.
I just found a note I had about credential hashing. What we want to model is: authentication tokens that can be passed around or used in place
Implemented in #63.
Can we model Credential hashing?