Replies: 1 comment 8 replies
-
Just to be picky, client certificates with mTLS are as well 😁 altough the UX of Browsers is not really a great thing, privacy is a tricky problem and the key distribution. However the distribution might be not the biggest issue here. Also the cross device problem also applies to this. |
Beta Was this translation helpful? Give feedback.
8 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Users authenticating on HTTPS websites using verifiable credentials stored on your wallet are still vulnerable to phishing attacks. This can be improved by using FIDO2 as a second factor to the SSI authentication. The DIDComm communication between agents has strong protection against phishing, not when the user scans a QR code.
Self sovereign identity phishing scenario using HTTPS websites:
This can only be prevented by using the browser client-side origin as part of the flow, signing this and returning this back to the server to be validated, thus preventing this type of phishing attack. This cannot be prevented unless the origin from the client browser is used and validated in the authentication process. The browser client-side origin is not used in the SSI login. At present FIDO2 is the only solution which could solve this.
Here’s the same problem description: Risk Mitigation for Cross Device Flows
Question
Will the E-ID solution protect users against phishing or allow users to have their verifiable credentials stolen in this way?
Beta Was this translation helpful? Give feedback.
All reactions