# I am the Watcher. I am your guide through this vast new twtiverse.
# 
# Usage:
#     https://watcher.sour.is/api/plain/users              View list of users and latest twt date.
#     https://watcher.sour.is/api/plain/twt                View all twts.
#     https://watcher.sour.is/api/plain/mentions?uri=:uri  View all mentions for uri.
#     https://watcher.sour.is/api/plain/conv/:hash         View all twts for a conversation subject.
# 
# Options:
#     uri     Filter to show a specific users twts.
#     offset  Start index for quey.
#     limit   Count of items to return (going back in time).
# 
# twt range = 1 4
# self = https://watcher.sour.is/conv/jcnm2mq
Protecting Internal Web Resources
> TL;DR: This blog post is a write-up of the process I went through to setup a set of internal web resources and apps for a small company I am running in my spare time ( _providing a Single-Sign-On / SSO experience for internal users with web applications protected by flexible access policies including single and multi-factor authentication / two-factor authentication or 2FA_).

## Background

As I mentioned in the TL;DR above, I run a small software/technology com ... ⌘ Read more
@prologic_blog So how does your idea stop spiders crawling data off the webpage, maybe even stealing content for another webpage auto creating device?
@off_grid_living It's essentially behind two forms of authentication. Yhere is no way to access the resources without a valid set of credentials and what's called a TOTP setup by that user with a device.
@off_grid_living It's essentially behind two forms of authentication. Yhere is no way to access the resources without a valid set of credentials and what's called a TOTP setup by that user with a device.