Hacking JSON Web Tokens (JWTs)

And how attackers forge tokens and log in as someone else.