Oauth2 protocol is used, which is an industry-standard authorization framework known for its robust security. The Oauth2 protocol only accepts login attempts from trusted URLs and issues industry-standard 2048 bytes access tokens. JSON Web Tokens (JWT) is integrated with the Oauth2 protocol to provide an additional layer of security, utilizing secure algorithms for token generation and verification.
ES512 (ECDSA with SHA-512): A strong asymmetric algorithm utilizing ECDSA (Elliptic Curve Digital Signature Algorithm) with SHA-512 for secure data encryption and digital signatures.
At Fluid Attacks
, we are committed to providing a secure and reliable environment for our users. Our use of Oauth2 with JWT and these strong, secure algorithms reinforces our dedication to safeguarding user data and ensuring secure access to our platform.