All my posts
Today, I take a moment for a little reflection. Just a couple of months ago, I had started reading this book by Vittorio Bertocci because I felt the need to review some important concepts in the field of authentication protocols.
After reading some passages from the book, I found myself exclaiming in my head several times, “Okay… now I get it! Couldn’t they explain it like this in the official documentation?