If the data is Url Encoded, is it secure enough to send login credentials over HTTP GET?
相关问题
- “Zero out” sensitive String data in Swift
- firebase storage cors strange Behaviour
- High cost encryption but less cost decryption
- HTML <form> tag causing Rails form to submit
- How to restrict VOB read access in ClearCase (Wind
相关文章
- C#中 public virtual string Category { get; }这么写会报错:
- Warning : HTML 1300 Navigation occured?
- Security concerns about CORS
- How do I prevent SQL injection with ColdFusion
- Send a GET request with a body in JavaScript (XMLH
- LINQ to Entities and SQL Injection
- How to use Google application-specific password in
- Will re-populating a password field in a form be a
Not at all secure.
URL encoding is not any kind of encryption, it just prepares the string to be sent through the network.
If your data is sensitive, GET should be completely out of question. Reasons for this?
Please read the purpose of URL encoding
Security is not the point here. Like already noted, HTTPS should be used when that is required.
URLEncoding is for encoding/transmission, not security.
Not at all. URL encoded is easily reversible. You should encrypt the transport layer (i.e. use HTTPS)
No - URL encoding is meant to make sure all the characters you try to send with a GET request can actually arrive at the other end.
It is actually designed to be easily encoded and decoded to prepare data for transport, not for security.