<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Ankur Goyal</title>
    <description>The latest articles on Forem by Ankur Goyal (@mrmonk).</description>
    <link>https://forem.com/mrmonk</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1239154%2F8e44de70-9917-4e77-a0fd-cc8f536648b5.jpg</url>
      <title>Forem: Ankur Goyal</title>
      <link>https://forem.com/mrmonk</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/mrmonk"/>
    <language>en</language>
    <item>
      <title>How was your tech stack switching experience? what difficulty you faced, specially to be java developer ?</title>
      <dc:creator>Ankur Goyal</dc:creator>
      <pubDate>Sat, 01 Jun 2024 16:57:18 +0000</pubDate>
      <link>https://forem.com/mrmonk/how-was-your-tech-stack-switching-experience-what-difficulty-you-faced-specially-to-be-java-developer--59a0</link>
      <guid>https://forem.com/mrmonk/how-was-your-tech-stack-switching-experience-what-difficulty-you-faced-specially-to-be-java-developer--59a0</guid>
      <description>&lt;p&gt;I know tech industry is rapid changing environment. all though developers love to know and learn about new technology. after getting some experience in their tech stack, I think it must be difficult to chase higher package as well as your favorite tech stack. share some experience or knowledge. I will really  be thankful. Can we chase favorite tech stack as well as 2x package? &lt;/p&gt;

</description>
    </item>
    <item>
      <title>What if anyone steals your JWT</title>
      <dc:creator>Ankur Goyal</dc:creator>
      <pubDate>Sun, 03 Mar 2024 11:57:27 +0000</pubDate>
      <link>https://forem.com/mrmonk/what-if-anyone-steals-your-jwt-41oc</link>
      <guid>https://forem.com/mrmonk/what-if-anyone-steals-your-jwt-41oc</guid>
      <description>&lt;p&gt;Storing JWTs (JSON Web Tokens) in cookies is a common practice, but it comes with security considerations. When storing JWTs in cookies, it's essential to set appropriate security measures to mitigate the risk of token theft. Here are some strategies to enhance security:&lt;/p&gt;

&lt;h2&gt;
  
  
  HttpOnly Flag:
&lt;/h2&gt;

&lt;p&gt;Set the HttpOnly flag on cookies containing JWTs. This prevents client-side scripts from accessing the cookie, reducing the risk of cross-site scripting (XSS) attacks.&lt;/p&gt;

&lt;h2&gt;
  
  
  Secure Flag:
&lt;/h2&gt;

&lt;p&gt;Set the Secure flag on cookies to ensure they are only transmitted over HTTPS connections. This prevents interception of cookies in transit over unsecured HTTP connections.&lt;/p&gt;

&lt;h2&gt;
  
  
  SameSite Attribute:
&lt;/h2&gt;

&lt;p&gt;Set the SameSite attribute on cookies to control when cookies are sent in cross-origin requests. Setting it to "Strict" or "Lax" helps prevent Cross-Site Request Forgery (CSRF) attacks.&lt;/p&gt;

&lt;h2&gt;
  
  
  Token Expiry:
&lt;/h2&gt;

&lt;p&gt;JWTs should have a relatively short expiration time. This limits the window of opportunity for an attacker to steal and misuse the token.&lt;/p&gt;

&lt;h2&gt;
  
  
  Token Revocation:
&lt;/h2&gt;

&lt;p&gt;Implement mechanisms for token revocation in case of suspected token compromise. This could involve maintaining a blacklist of revoked tokens or using token rotation techniques.&lt;/p&gt;

&lt;h2&gt;
  
  
  Additional Security Layers:
&lt;/h2&gt;

&lt;p&gt;Implement additional security measures such as rate limiting, IP filtering, and user-agent verification to protect against token theft and misuse.&lt;/p&gt;

&lt;p&gt;While storing JWTs in cookies can simplify authentication workflows, it's crucial to implement proper security measures to safeguard against potential vulnerabilities. Additionally, regularly reviewing and updating security practices based on emerging threats and best practices is essential to maintaining a secure authentication system.&lt;/p&gt;

&lt;p&gt;If you feel there are other ways, Feel free to comment. I would love to discuss on that. &lt;/p&gt;

</description>
      <category>javascript</category>
      <category>jwt</category>
      <category>security</category>
      <category>webdev</category>
    </item>
    <item>
      <title>What's something that you can only do in java</title>
      <dc:creator>Ankur Goyal</dc:creator>
      <pubDate>Sat, 23 Dec 2023 11:49:57 +0000</pubDate>
      <link>https://forem.com/mrmonk/what-can-you-do-only-in-java-2m6h</link>
      <guid>https://forem.com/mrmonk/what-can-you-do-only-in-java-2m6h</guid>
      <description>&lt;p&gt;Hey guys... can you tell me. What can you do only in java, which in not possible in any other language such as python, PHP, JavaScript. &lt;/p&gt;

</description>
      <category>java</category>
      <category>python</category>
      <category>webdev</category>
      <category>javascript</category>
    </item>
  </channel>
</rss>
