- My Forums
- Tiger Rant
- LSU Recruiting
- SEC Rant
- Saints Talk
- Pelicans Talk
- More Sports Board
- Fantasy Sports
- Golf Board
- Soccer Board
- O-T Lounge
- Tech Board
- Home/Garden Board
- Outdoor Board
- Health/Fitness Board
- Movie/TV Board
- Book Board
- Music Board
- Political Talk
- Money Talk
- Fark Board
- Gaming Board
- Travel Board
- Food/Drink Board
- Ticket Exchange
- TD Help Board
Customize My Forums- View All Forums
- Show Left Links
- Topic Sort Options
- Trending Topics
- Recent Topics
- Active Topics
Started By
Message
re: I have an app idea, where do I go to get it made?
Posted on 1/12/21 at 8:12 pm to Korkstand
Posted on 1/12/21 at 8:12 pm to Korkstand
Thank you. So it's not worth it.
I had very limited exposure to one API that we were using and it didn't have any limits of what someone could send in.
I'll just stick to my lane
I had very limited exposure to one API that we were using and it didn't have any limits of what someone could send in.
I'll just stick to my lane
Posted on 1/12/21 at 8:29 pm to Kujo
quote:That's up to you I guess. Sounds like your aim is to knock the advertising industry down a few pegs?
So it's not worth it.
Posted on 1/12/21 at 9:55 pm to Kujo
quote:It's very rare to find an API with no limits or authentication. And untold millions of coder-hours have been spent developing methods to make sure that a request is authentic.
I had very limited exposure to one API that we were using and it didn't have any limits of what someone could send in.
Generally, API requests are "signed" with a secret key which makes it basically impossible to modify the data. Even if you can read in clear text exactly the message that an app is sending, you still will not be able to change the message and pass it on to the API. The server will know that it has been modified because the signature will no longer be valid. The payload of the message is incorporated into the signature, so that a change of a single character will require a completely different signature.
And of course the secret key is generally well-protected.
In simple terms, imagine I want to send you a secret message on a piece of paper, but I have to send it with a messenger. I have a lockbox, a padlock, and a key for the padlock. You also have a padlock and a key for it. I do NOT have a key for your padlock, and you do NOT have a key for mine. How do we send secure messages to each other when a 3rd party has to carry the lockbox and we can't unlock each other's padlocks?
I put the message in the box and lock it with my padlock. The messenger carries the box to you, unable to open the box. You receive a locked box that you can't open. You put YOUR padlock on the box as well, and send it back to me via the messenger. I receive the double-locked box, and I remove my padlock. I send it back to you via the messenger. You receive the box once again, you unlock your padlock and read the message.
So that's basically how a secure connection is set up. That's how my computer or phone can send my password to a server in a way that no one can intercept it and read it. It's just that instead of a padlock, messages are encrypted. Once this is done, the server can send an authentication token for signing future messages to eliminate the extra back-and-forth, time-consuming, re-authentication process.
If you want to learn more, look up hash functions, public key encryption, https, TLS, and just follow the trail.
Posted on 1/13/21 at 12:40 am to Korkstand
our API received millions of data points daily for ~14,000 transactions. I had to create a way to validate (going back over 2 years) which data we wanted and which was incomplete or duplicates, but that's on a data analysis side not on the computer coding side.
It gave me so much trouble, that I figured why can't everybody's data be corrupted similarly.
I found a way to figure out a way to clean the data, but that was because of common flaws not because somebody was actually trying to mess with me.
It gave me so much trouble, that I figured why can't everybody's data be corrupted similarly.
I found a way to figure out a way to clean the data, but that was because of common flaws not because somebody was actually trying to mess with me.
Posted on 1/13/21 at 11:51 am to Korkstand
quote:
Generally, API requests are "signed" with a secret key which makes it basically impossible to modify the data. Even if you can read in clear text exactly the message that an app is sending, you still will not be able to change the message and pass it on to the API. The server will know that it has been modified because the signature will no longer be valid. The payload of the message is incorporated into the signature, so that a change of a single character will require a completely different signature.
For the most part, the payload of the request lives in the request body or URL and not in some hashed key, the API authorization token is found in the header. The majority of APIs are setup to where you present authorization via the request header, and if valid, it lets you through to do what you want (ie a POST request with location data in the request body) or sends the information you requested. The key has nothing to do with how the payload is sent and the contents of the request body will not alter the validity of the auth token. Sure, request over HTTPS are encrypted because it's HTTPS but that doesn't mean you can't intercept requests and change their payload via proxy, Charles and Fiddler are two programs that do this.
So, to the OP, getting the request would be the "easy" part. Figuring out an algorithm for each app to decide when to alter request and when you let them act naturally (i.e. the user is actually trying to use the app) would be the hardest part, as it would likely be different for each app. Also you can't just send the API a bunch of random shite. The API endpoint is looking for specific information and will ignore other information. The app would be very expensive to develop, I would imagine, and the minimal impact of the outcome probably isn't worth it.
Posted on 1/13/21 at 12:40 pm to Fat Batman
quote:I did not mean that the payload is sent in hashed form, by "incorporated" I meant that the payload is used to generate the hash found in the header.
For the most part, the payload of the request lives in the request body or URL and not in some hashed key, the API authorization token is found in the header.
quote:Look up MAC / HMAC tokens.
The majority of APIs are setup to where you present authorization via the request header, and if valid, it lets you through to do what you want (ie a POST request with location data in the request body) or sends the information you requested. The key has nothing to do with how the payload is sent and the contents of the request body will not alter the validity of the auth token. Sure, request over HTTPS are encrypted because it's HTTPS but that doesn't mean you can't intercept requests and change their payload via proxy,
Posted on 1/13/21 at 5:00 pm to Korkstand
Yeah there is a lot of ways to do auth. But the vast majority of sites/apps you see do it like I said above. You have a token given to you by the server, that gets you in the door and it has nothing to do with the request body aka payload. There is no client side hashing of passwords/JSON, which would be kinda pointless as far as passwords go unless you were trying to steal credentials from one site and use them on another.
Posted on 1/13/21 at 5:35 pm to Fat Batman
I guess my explanation is lacking because I did not mean to give the impression that the payload itself has to be obfuscated in any way in order to secure it from modification. As a simple example, you could hash the body contents and include that hash as a claim in your signed JWT. Now the server can verify that the body is exactly what the JWT says it should be. No one can change location data, for example, without generating a new JWT. And they can't do that without the key.
I believe AWS does something similar with some of their services.
I believe AWS does something similar with some of their services.
Posted on 1/13/21 at 7:54 pm to Korkstand
You can decode JWTs, you shouldnt put sensitive info in a JWT payload and in the majority of use cases clients aren't going to be altering the JWT. We will just have to agree to disagree on this aspect. However, maybe we can agree on this... if something happens on the client, like a request, you, as the client, have control over it. You could write a script/plugin/ext/app that when you click to add an item to your cart on amazon, it instead orders a pizza from Dominos.
Posted on 1/13/21 at 8:22 pm to Fat Batman
We aren't talking about sensitive info, we are talking about location data provided to an API server. Open, in the clear, in the body of the request. The server just needs to make sure it hasn't been modified by a middle man. You can do that with a token in the request header.
The whole point of a JWT is to verify that the claims it makes are legit by verifying its signature. If I add a new custom claim to a JWT, the signature will change. If I add a claim that is a hash of the request body (which includes location data), the JWT signature will allow the server to know that the request body has not been modified by a middle man. You can't change the request body without changing the hash it produces, and you can't put this new hash in the JWT claims without signing it again, and you can't sign it again without the key. Make sense?
Edit: To clarify, this requires a shared key for symmetric signing.
The whole point of a JWT is to verify that the claims it makes are legit by verifying its signature. If I add a new custom claim to a JWT, the signature will change. If I add a claim that is a hash of the request body (which includes location data), the JWT signature will allow the server to know that the request body has not been modified by a middle man. You can't change the request body without changing the hash it produces, and you can't put this new hash in the JWT claims without signing it again, and you can't sign it again without the key. Make sense?
Edit: To clarify, this requires a shared key for symmetric signing.
This post was edited on 1/13/21 at 8:30 pm
Popular
Back to top
