<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security on Sofia Fischer; Philodev</title><link>https://philodev.one/tags/security/</link><description>Recent content in Security on Sofia Fischer; Philodev</description><generator>Hugo</generator><language>en</language><managingEditor>sofia@philodev.com (Sofia Fischer)</managingEditor><webMaster>sofia@philodev.com (Sofia Fischer)</webMaster><copyright>© 2026 Sofia Fischer. Licensed under [CC BY-NC 4.0](https://creativecommons.org/licenses/by-nc/4.0/)</copyright><lastBuildDate>Tue, 10 Sep 2024 10:20:44 +0200</lastBuildDate><atom:link href="https://philodev.one/tags/security/index.xml" rel="self" type="application/rss+xml"/><item><title>Understanding other oAuth flows</title><link>https://philodev.one/posts/2024-09-o-auth-2/</link><pubDate>Tue, 10 Sep 2024 10:20:44 +0200</pubDate><author>sofia@philodev.com (Sofia Fischer)</author><guid>https://philodev.one/posts/2024-09-o-auth-2/</guid><description/></item><item><title>Understanding oAuth Authentication Code Flow</title><link>https://philodev.one/posts/2024-08-o-auth/</link><pubDate>Mon, 09 Sep 2024 10:20:44 +0200</pubDate><author>sofia@philodev.com (Sofia Fischer)</author><guid>https://philodev.one/posts/2024-08-o-auth/</guid><description/></item></channel></rss>