this post was submitted on 03 Apr 2024
55 points (96.6% liked)

Technology

59457 readers
3697 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
top 9 comments
sorted by: hot top controversial new old
[–] bitfucker@programming.dev 10 points 7 months ago (1 children)

Be careful since it is a double edged sword. Device bound session means the browser has the capabilities to differentiate devices, and thus can be used for more accurate tracking information. Of course I'm not saying it is not useful, having created a fair share of websites myself, I know the pain of authentication on the web and how it can be challenging to secure from tons of possible attack vectors. And in my experience, the weakest link is always the user.

[–] dev_null@lemmy.ml 5 points 7 months ago (1 children)

the browser has the capabilities to differentiate devices

The browser can do it whether this exists or not. The only information the website gets is that the browser supports this feature or not, and nothing else.

[–] bitfucker@programming.dev 2 points 7 months ago (1 children)

My bad, I worded that badly. What I meant is that the website now has access to those features via the browser (js or some other mechanism). Now suddenly fingerprinting a device can be made easier.

[–] dev_null@lemmy.ml 1 points 7 months ago* (last edited 7 months ago) (1 children)

That's a valid concern, but according to the article all the website can access is the random public key, or the fact that the feature is unsupported in this browser (for an unspecified reason).

[–] bitfucker@programming.dev 1 points 7 months ago

Yeah, I've also read the article. I am just being cautious on how it can be used for other things that cause privacy concern. And so far, I've come up blank too.

[–] blackfire@lemmy.world 2 points 7 months ago

This is an incredibly important step forward but I have to wonder why its taken this long to come up with.

[–] Boomkop3@reddthat.com 1 points 7 months ago

That took forever to implement, almost as if someone had stake in not doing this

[–] CaptainBasculin@lemmy.ml 0 points 7 months ago (1 children)

Isn't this what WebAuthn already does? Why introduce a new protocol when another one does the job well?

[–] dracs@programming.dev 5 points 7 months ago

I don't think WebAuthn protects against cookie theft. WebAuthn better protects the login process. But if the result of the login process is still a session/auth cookie, that can be stolen like any other cookie.