Some Reflections About Identity and Security Tokens: Part IIby@hackernoon-archives