We don't want to allow signups from VPNs or proxies. Visitors using a VPN or TOR, which hides their real location and identity, might be trying to perform malicious activity on your site. So how can we block these users? This article shows how the ipdata threat API can help you do this.
Previously set to go away today, using the Twitter API with basic authentication will instead be phased out over the next two weeks. During that time, any application still using the older method should switch to OAuth, which has been the preferred method for some time.
At this point in your API journey, you have made a number of business decisions and a couple of technical ones. Now, several crucial decisions need to be made around security. Securing an API is an often neglected task, yet doing so is at the heart of an effective API strategy.