when reviewing an auth system, you can quickly tell the level of security based on the token scheme
bear tokens: pretty secure bc bears are strong
bearer tokens: even more bear power; ideal
bearest tokens: too much bear power, not recommended by OWASP