У нас вы можете посмотреть бесплатно Stop Storing JWT in LocalStorage! Use Cookies Instead (XSS Risk Explained) или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Are you still storing JWT tokens in localStorage and hoping everything is fine? In this video, we break that myth completely. Using a real React (Vite) app, we walk through how authentication works in a typical CSR setup, then turn that same flow into a live XSS attack demo. You’ll see how a malicious script hosted on AWS S3 + CloudFront quietly steals your JWTs, cookies and user data, and sends everything to an attacker’s Express + Bun server – all in a few milliseconds and with zero visual warning to the user. What you’ll learn: Why storing JWTs in localStorage is a serious security risk How XSS attacks actually work in modern React apps How an attacker can exfiltrate tokens and hijack sessions The difference between CSR vs SSR from a security point of view Why httpOnly cookies and server‑side auth are the safer alternative This video is Part 1 of a small series on modern web authentication and security. In Part 2, we’ll rebuild this flow the right way using Next.js, SSR and httpOnly cookies to lock down your tokens and protect your users. If you’re a React / Next.js / MERN / full‑stack dev shipping real products, this is must‑know security knowledge. Watch it, refactor your auth, and stop giving free gifts to XSS attackers.