You might be on level re: data leakage and this should be a very important consideration for any person rolling their own personal authentication/authorization scheme. +one for mentioning OWASP. Like a hacker, you are able to perform for an MSSP, supplying them a standpoint they couldn’t get from a daily http://pigpgs.com