Explores BGP security weaknesses, real-world incidents, and defenses against BGP hijacking, emphasizing the importance of cryptography in securing routing information.
Discusses the OAuth 2.0 Authorization Framework, client challenges, authorization grants, and security vulnerabilities like phishing attacks and session fixation.