On Tue, September 30, 2014 5:47 pm, fhw...@gmail.com wrote:
>  FIDO has its shortcomings, too,
>  ‎and its users can be victims of phishing just as much as anyone else.

While a discussion of FIDO is best suited for the FIDO-specific groups, I
would just highlight that you're mistaken in this. You can find the FIDO
specifications at https://fidoalliance.org/specifications/download

The FIDO protocols bind the authentication token to the origin being
authenticated with - that is, the UA is a trusted party in the process and
provides origin-binding information to the FIDO device.

Yes, this means malware is still in scope.
No, this does NOT mean "touch here to continue" is valid or a phishable
target.

It also means that one origin's access to your FIDO device does not affect
or influence the ability of other origin's access or capabilities. This is
an important difference compared with client certs, particularly when
exposed programatically.

Further, by defining a limited signing protocol, as opposed to the common
"sign this hash" in smart cards, you avoid issues where your email program
has the same access as your tax filing program and as  your web page.
Nominally, you would use different client certificates and keys for each
of these, but the actual practice of this is surprisingly less common.

Just wanting to avoid perpetuating misinformation.

Cheers

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to