Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

For a desktop application could use the password flow[0], no need to involve a web browser. Yeah, sure, you're now handing keys to the kingdom to that application, but if it's native software it could also have installed a keylogger or used an embedded browser component and extracted the data from there.

[0] https://www.rfc-editor.org/rfc/rfc6749#section-4.3



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: