Anonymous ID: 06ed7e Nov. 6, 2020, 3:34 p.m. No.11508646   🗄️.is đź”—kun   >>8686

>>11508535

https://www.fastcompany.com/3044280/the-ghosts-of-app-permissions-past

 

The Big Three gatekeepers have an enormous amount of data about us. They’re like Santa Claus: They know when we’ve been sleeping; they know when we’re awake; and they know when a new dating app gets hot because every new entrant is built on Facebook login and access to the friend list. You shouldn’t need to get hacked to realize the scale of authority being outsourced.

Anonymous ID: 06ed7e Nov. 6, 2020, 3:36 p.m. No.11508686   🗄️.is đź”—kun

>>11508535

>>11508646

 

So called "Social Login" uses OAuth authentication.

 

https://en.wikipedia.org/wiki/Social_login

 

Social login can be implemented strictly as an authentication system using standards such as OpenID or SAML. For consumer websites that offer social functionality to users, social login is often implemented using the OAuth standard. OAuth is a secure authorization protocol which is commonly used in conjunction with authentication to grant 3rd party applications a "session token" allowing them to make API calls to providers on the user's behalf. Sites using the social login in this manner typically offer social features such as commenting, sharing, reactions and gamification.

 

While social login can be extended to corporate websites,[3] the majority of social networks and consumer-based identity providers allow self-asserted identities. For this reason, social login is generally not used for strict, highly secure applications such as those in banking or health.