Implement secure transaction between the application and the server. OAuth 2.0 or similar should be used to authenticate users accessing the server back-end. Development will continue using unsecured communication techniques in the meantime.
Log in to post a comment.