somethingnew
β¨Β https://twitter.com/itspeterc
[ my public key: https://keybase.io/petercollins; my proof: https://keybase.io/petercollins/sigs/yeZIba2qpUOE6XzgjubdowDhvETHlA7rcczXFu-u9c8 ]
π Joined in 2012
πΌ 633 Karma
βοΈ 111 posts
π
15 latest posts
Load more
π€somethingnewπ3moπΌ3π¨οΈ0
π€somethingnewπ1yπΌ2π¨οΈ0
π€somethingnewπ3yπΌ1π¨οΈ0
π€somethingnewπ9yπΌ2π¨οΈ0
π€somethingnewπ9yπΌ1π¨οΈ0
π€somethingnewπ9yπΌ4π¨οΈ0
(Replying to PARENT post)
π€somethingnewπ10yπΌ0π¨οΈ0
Show HN:
π€somethingnewπ10yπΌ2π¨οΈ1
π€somethingnewπ10yπΌ3π¨οΈ0
(Replying to PARENT post)
Besides Session IDs and Session Tickets[1] which already exist in the TLS protocol. He could be referring to the Token Binding Protocol Draft[2] which, quoting from it's summary, "allows client/server applications to create long-lived, uniquely identifiable TLS bindings spanning multiple TLS sessions and connections".
[1] https://en.wikipedia.org/wiki/Transport_Layer_Security#Resum...
[2] https://tools.ietf.org/html/draft-ietf-tokbind-protocol-01
π€somethingnewπ10yπΌ0π¨οΈ0
π€somethingnewπ10yπΌ8π¨οΈ1
π€somethingnewπ10yπΌ3π¨οΈ0
(Replying to PARENT post)
Not having to worry about calculating the length of the message before transferring it?
π€somethingnewπ10yπΌ0π¨οΈ0
π€somethingnewπ10yπΌ5π¨οΈ2
(Replying to PARENT post)