Another method which may be suitable for some uses (although the working of web browsers means that it will not work securely in a web browser, unless you have an extension, but it can work easily in other programs) is HMAC, although this is not suitable for all uses. For idempotent write operations which are not intended to be secret, it might work.
m-hodges•1d ago
I mean, if you’re going to write a post about auth methods, you gotta say more than this.