Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

HTTP port 80 traffic from Android app:

  GET /v1/checkins?geolat=34.2842613&geolong=-118.2471837&geohacc=112.0 HTTP/1.1
  User-Agent: com.joelapenna.foursquared:2010080500
  Host: api.foursquare.com
  Connection: Keep-Alive
  Authorization: Basic dXNlckBleGFtcGxlLmNvbTpwYXNzd29yZA==

HTTP port 80 traffic from iPhone app:

  POST /v1/checkin.json HTTP/1.1
  Host: api.foursquare.com
  User-Agent: Mozilla/5.0 (iPhone; U; CPU iPhone OS 2_2 like Mac OS X; en-us)
  Content-Type: application/x-www-form-urlencoded
  Authorization: Basic dXNlckBleGFtcGxlLmNvbTpwYXNzd29yZA==
  Accept-Encoding: gzip
  Accept: */*
  Accept-Language: en-us
  Content-Length: 250
  Connection: keep-alive


In case this wasn't clear or you didn't read the article, 4sq is using HTTP Basic authentication:

  >>> base64.decodestring("dXNlckBleGFtcGxlLmNvbTpwYXNzd29yZA==")
  'user@example.com:password'




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: