Summer 2020 saw the first completely remote YC batch in history. My co-founder Peter and I were fortunate enough to participate with our company Plum Mail and we did so entirely remotely from our homes in South West England.
What was it like you ask? Essentially, it was like taking an e-learning course. This had a number of benefits for us as a team, which are totally valid, but a number of disadvantages surface as you progress through the process.
The whole YC team did a genuinely amazing job of making the experience hugely valuable, exciting and accessible. As a…
Abstract: One click sign in using device authentication offers convenience and security to the user.
One click sign in allows users to authenticate in just one click. Delivering this was the reason DID.app was started. This is our story of implementing one click sign in.
Users have ‘account creation fatigue’. The average person already has 150+ accounts and the problem is still getting worse. There are so many websites that want you to create an account and it’s hard to keep track of them all.
Users want to engage but without filling in endless forms. We also know users crave…
To what extent do you allow your users and customers guide your development process? This is a question we have grappled with over the last year and, frankly, continue to debate passionately at our morning pow wow. But, today is the first time we have shipped a purely user-requested feature and it feels like a significant milestone.
For context, the requested feature allows you to start customising the appearance of DID.app’s sign in pages to ensure your authentication aligns with your brand. Here’s the feature request on our roadmap. And here’s the output in our docs.
This is a significant…
OAuth is short for Open Authorization.
OAuth 2.0 is a framework for token-based authorization on the web. What does that mean? Basically, OAuth is a way for websites to share private information that belongs to an authenticated user of that website. Authorization tokens are issued which grants access to specific pieces of information hence the term token-based authorization.