Answer the question
In order to leave comments, you need to log in
How secure is this method of user authorization?
The customer wants authorization without a login / password or through social networks, but with the help of a small file. Thus, the user, having entered the authorization page, specifies the required file (the allowable size will be limited). Several parameters are calculated from this file, for example SHA1, SHA256, CRC64 and compared with the data in the database (the issue of registration is not currently considered), if all the data match, then we give the user access.
Question: how safe is it?
Answer the question
In order to leave comments, you need to log in
Safer than login-password/authorization through third parties. Login + password = key up to a hundred bytes long (usually).
A file of at least a kilobyte will be much safer.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question