Timeline for Intercept calls to authenticated 3rd-party APIs, to automatically add auth keys?
Current License: CC BY-SA 4.0
6 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Aug 25, 2024 at 20:06 | comment | added | Samuel Marks | C can send a response back to A indirectly going through B first. | |
| Aug 25, 2024 at 11:50 | comment | added | Sir Muffington | And gets no response? | |
| Aug 24, 2024 at 19:08 | comment | added | Samuel Marks | A -> B; B-> C. B adds a secret. A never sees it. | |
| Aug 21, 2024 at 18:02 | comment | added | Sir Muffington | Welcome to the community. Why did you think that this traffic cannot be inspected? | |
| S Aug 20, 2024 at 20:00 | review | First questions | |||
| Aug 21, 2024 at 18:02 | |||||
| S Aug 20, 2024 at 20:00 | history | asked | Samuel Marks | CC BY-SA 4.0 |