05/01/202310/04/2023Attack, Security Attack: JWT modification In my previous post “what abaout: JWT” we looked at what JWT actually is and how it is used. We only looked at the basics, there are countless articles out there that […]