2014-09-16 UTC
# Mark87 I'm a little skeptical on the expiring endpoints. If I'm an attacker, the expirations prevent me from building a long-lived list of endpoints, but i can still build a list of urls that have endpoints. Presumably I can troll that entire list to get the latest endpoint list and then launch my attack. Expiring the endpoints just adds an extra step