> Please don't weigh me unless it's (really) medically necessary. If you really need my weight, please tell me why so that I can give you my informed consent.
Not as "daft" as the headline, is it?
This isn't true in the UK, yet the article mentions a lack of truck drivers here - that's more likely to be due to Brexit and then not wanting to come back after being treated badly last winter.
This is generally true in most countries: although the exact mechanism was different, people ended up with more discretionary income and fewer services to spend it on, and so demanded more goods.
If they do so, the maintainers become more vigilant and the experiment fails. But, the key to the experiment is that maintainers are not vigilant as they should be. It’s not an attack to the maintainers though, but to the process.
I'mnot sure that's entirely true. It's not hard to include an extra static token within the JWT which is delivered to the servers through an alternative method (pushed with production, or manually set), which when it changes forces a re-auth (either just a DB auth session because you've specifically set the conditions such that you only care if PW changed or some other flag set, or a full login procedure).
If the same static token is used for all users, all users will need to do this on the next request. If you subdivide your users by some metric (first x characters of username, some modulo of numeric ID) then you can invalidate some subset of the userbase JWT tokens instead.
You've now gained the ability to immediately invalidate a JWT tokens as long as you're okay with forcing extra computation on some larger set of completely valid ones at the same time.
Edit: Changed wording of last sentence to clarify you don't necessarily have to invalidate all sessions just by invalidating all JWT tokens, as outlined in further comments below.