Gail started off showing the OAUTH setup as shown in the main storyline, and then went into a few code details. Most of this is from Gail's screenshare within our Discord voice-chat, so the detail isn't so great. Here we appear to be looking at this code in an interactive development environment, seeing [my best guess] a fragment for various crypto operations around signing and authenticating request/response traffic. |
What's fascinating about this to me is that I realized I was looking at the next layer down from the third-party bots that I was working with. *Those* would also be running code similar to this, and putting the veneer of control-panel configurability on top to make it easier for folks who don't live and breathe at this level. We can't really call this "bare metal" since there are still a lot more layers down before we make actual bits fly, but this was clearly a lot more "nekkid" than what I was fooling with. |