Thanks for your answers.
At this moment I heard:
"This is a protocol violation!"
But that's only because I'm "listening" to "Law & Order", so I don't think they're talking about http ?
- Token: how do i know if i passed it to the legitimate client user? Every time I forget how to exploit the public-private key technique; I suppose it would be the best way.
- (damn mosquito ?)
- Session variables: theoretically a hacker could get these too, right? (and actually the token too)
- TSL 1.2: I guess the older version was also considered safe, then...! Also I suppose the ability to use version 1.2 depends on the client and server libraries (I have to check this).
While waiting for you (and others) to choose which strategy is the best ? , I search the web.
Thank you.
[Meanwhile "Law & Order" is over and I haven't heard how they framed the killer ?]
[... and I failed to kill the mosquito
? ]