med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

343
active users

#authentication

2 posts2 participants1 post today
Bill<p>Some research on how password recovery has to mature in the face of passwordless authentication. Hmm, wonder if the OWASP team on that gas plans.</p><p><a href="https://www.darkreading.com/endpoint-security/researchers-warn-hidden-risks-passwordless-account-recovery" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">darkreading.com/endpoint-secur</span><span class="invisible">ity/researchers-warn-hidden-risks-passwordless-account-recovery</span></a></p><p><a href="https://infosec.exchange/tags/authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentication</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a></p>
Paralhax 👾<p>‘David logged in using a facial scan, then, with a couple of lines of code, Osswald was able to insert a Hello facial scan he made on another machine into the database and unlock David's machine instantly.’ :blobcat_thisisfine: </p><p><a href="https://www.theregister.com/2025/08/07/windows_hello_hell_no/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/08/07/win</span><span class="invisible">dows_hello_hell_no/</span></a></p><p><a href="https://infosec.exchange/tags/BlackHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHat</span></a> <br><a href="https://infosec.exchange/tags/authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentication</span></a> <br><a href="https://infosec.exchange/tags/biometrics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biometrics</span></a> <br><a href="https://infosec.exchange/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <br><a href="https://infosec.exchange/tags/ITSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSec</span></a> <br><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <br><a href="https://infosec.exchange/tags/BlackHat2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHat2025</span></a></p>
knoppix<p>Proton launches Proton Authenticator, a new open-source, end-to-end encrypted 2FA app 🛡️<br>Available on iOS, Android, Windows, macOS &amp; Linux 📱💻</p><p>🔐 Securely store and sync your 2FA codes—no tracking, no ads, offline-friendly<br>🔁 Easy import from Google &amp; Microsoft Authenticator<br>🔓 No Proton account required</p><p><span class="h-card" translate="no"><a href="https://mastodon.social/@protonprivacy" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>protonprivacy</span></a></span> <br><span class="h-card" translate="no"><a href="https://mastodon.social/@itsfoss" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>itsfoss</span></a></span> </p><p><a href="https://news.itsfoss.com/proton-authenticator-launch/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.itsfoss.com/proton-authen</span><span class="invisible">ticator-launch/</span></a></p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://mastodon.social/tags/2FA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2FA</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/Proton" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proton</span></a> <a href="https://mastodon.social/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://mastodon.social/tags/Authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authentication</span></a> <a href="https://mastodon.social/tags/DataProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataProtection</span></a> <a href="https://mastodon.social/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechNews</span></a> <a href="https://mastodon.social/tags/Freedom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Freedom</span></a> <a href="https://mastodon.social/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://mastodon.social/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a></p>
Erik van Straten<p><span class="h-card" translate="no"><a href="https://kolektiva.social/@LukefromDC" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>LukefromDC</span></a></span> wrote:<br>&gt; "Some people (myself included) will never reveal a real birthday online and will respond to a request for a birthday with a fake, will check an "I am over 18" box or button, but will close the tab for anything more."</p><p>Sure, but the European Commission wants civillians to start using EUDIW (EUropean Digital Identity Wallet, aka EDIW) soon. If a website demands authentication using such an app, cheating will not be easy. You'll have two choices: abort or do what's being asked.</p><p>Website owners mostly, if not always, demand more PII than strictly necessary. Lying will become a lot harder when using EDIW than filling in forms.</p><p>&gt; "I have NoScript (on the desktop) and Privacy Browser(on phones) set up to block 3ed party code unless explicitly enabled every time."</p><p>I too use NoScript as much as possible. However, IMO it does not solve any risks associated with mandatory authentication.</p><p>&gt; "Any unique age verification token is a tracker by definition BTW."</p><p>That is not necessarily true, at least according to the app's specification. There are all kinds of (possibly unexpected) tricks using (asymmetric) cryptography that can be played.</p><p>All of which does not mean that I'm a fan, on the contrary. Reliable authentication (including partial, such as proving being e.g. 18+), online in particular, is HARD.</p><p>It gets even harder if neither the verifier, nor the person being (partially) authenticated, benefits.</p><p>And the more privacy-friendly the less reliable it becomes - and the harder it gets to detect fraud.</p><p><span class="h-card" translate="no"><a href="https://sigmoid.social/@drgroftehauge" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>drgroftehauge</span></a></span> <span class="h-card" translate="no"><a href="https://manganiello.social/users/fabio" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fabio</span></a></span> <span class="h-card" translate="no"><a href="https://chaos.social/@SylvieLorxu" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>SylvieLorxu</span></a></span> </p><p><a href="https://infosec.exchange/tags/Authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authentication</span></a> <a href="https://infosec.exchange/tags/AgeVerification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AgeVerification</span></a> <a href="https://infosec.exchange/tags/Fraud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fraud</span></a> <a href="https://infosec.exchange/tags/IdentityFraud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityFraud</span></a> <a href="https://infosec.exchange/tags/Impersonation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Impersonation</span></a> <a href="https://infosec.exchange/tags/EDIW" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDIW</span></a> <a href="https://infosec.exchange/tags/EUDIW" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EUDIW</span></a> <a href="https://infosec.exchange/tags/eID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eID</span></a> <a href="https://infosec.exchange/tags/OnlineAuthentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OnlineAuthentication</span></a> <a href="https://infosec.exchange/tags/RemoteAuthentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteAuthentication</span></a></p>
Pyrzout :vm:<p>Fighting AI with AI: How Darwinium is reshaping fraud defense <a href="https://www.helpnetsecurity.com/2025/07/29/alisdair-faulkner-darwinium-ai-powered-fraud-defense-tools/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/07/29</span><span class="invisible">/alisdair-faulkner-darwinium-ai-powered-fraud-defense-tools/</span></a> <a href="https://social.skynetcloud.site/tags/Artificialintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Artificialintelligence</span></a> <a href="https://social.skynetcloud.site/tags/BlackHatUSA2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHatUSA2025</span></a> <a href="https://social.skynetcloud.site/tags/authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentication</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/automation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>automation</span></a> <a href="https://social.skynetcloud.site/tags/enterprise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enterprise</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Darwinium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Darwinium</span></a> <a href="https://social.skynetcloud.site/tags/Features" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Features</span></a> <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/strategy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>strategy</span></a> <a href="https://social.skynetcloud.site/tags/opinion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opinion</span></a> <a href="https://social.skynetcloud.site/tags/fraud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fraud</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://social.skynetcloud.site/tags/LLMs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLMs</span></a> <a href="https://social.skynetcloud.site/tags/tips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tips</span></a></p>
Erik van Straten<p><span class="h-card" translate="no"><a href="https://kolektiva.social/@LukefromDC" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>LukefromDC</span></a></span> : it won't be that bad (it will be bad, but in a different way).</p><p>ANY website may ask a user to confirm they are 18+ (or whatever age).</p><p>There will be a huge amount of AitM (Attacker in the Middle) websites where naive people will be lured to (using fake emails, SMS, chat app messages or falsified QR-codes) and asked to confirm their age.</p><p>That AitM website will subsequently obtain a "ticket" (session cookie) from a real "relying party" website (with a potentially very different type of content than the victim is told).</p><p>Those "tickets" will be sold (or traded for watching ads and/or paying with privacy).</p><p>Reliable authentication requires a trustworthy identity verifier (even if identification is restricted to age+).</p><p><span class="h-card" translate="no"><a href="https://sigmoid.social/@drgroftehauge" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>drgroftehauge</span></a></span> <span class="h-card" translate="no"><a href="https://manganiello.social/users/fabio" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fabio</span></a></span> <span class="h-card" translate="no"><a href="https://chaos.social/@SylvieLorxu" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>SylvieLorxu</span></a></span> </p><p><a href="https://infosec.exchange/tags/AgeVerification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AgeVerification</span></a> <a href="https://infosec.exchange/tags/ByPass" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ByPass</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/AitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AitM</span></a> <a href="https://infosec.exchange/tags/MitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MitM</span></a> <a href="https://infosec.exchange/tags/Identification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Identification</span></a> <a href="https://infosec.exchange/tags/IdentityVerification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityVerification</span></a> <a href="https://infosec.exchange/tags/Authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authentication</span></a> <a href="https://infosec.exchange/tags/Impersonation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Impersonation</span></a> <a href="https://infosec.exchange/tags/ForSale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ForSale</span></a></p>
Erik van Straten<p><span class="h-card" translate="no"><a href="https://social.wildeboer.net/@jwildeboer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jwildeboer</span></a></span> : modern certificates are used for authentication only, not for secure connections.</p><p>OTOH, if you have no certainty that your software is communicating with the server you intended, a secure connection to it is pointless - but the connection remains secure.</p><p>Using TLS v1.3, the connection is even secured before the server is authenticated (if, after encrypting the connection, the authentication of the server fails, then the client should at least warn the user - if not immediately disconnect).</p><p>Yes, I know, these are boring details, but they are misunderstood way too often by people who SHOULD know how this works (I know you do, but please don't simplify things too much).<br> </p><p><a href="https://infosec.exchange/tags/TLS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TLS</span></a> <a href="https://infosec.exchange/tags/https" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>https</span></a> <a href="https://infosec.exchange/tags/X509" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>X509</span></a> <a href="https://infosec.exchange/tags/Certificates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Certificates</span></a> <a href="https://infosec.exchange/tags/Certs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Certs</span></a> <a href="https://infosec.exchange/tags/Identification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Identification</span></a> <a href="https://infosec.exchange/tags/Authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authentication</span></a> <a href="https://infosec.exchange/tags/Impersonation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Impersonation</span></a> <a href="https://infosec.exchange/tags/TLSv1_3" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TLSv1_3</span></a> <a href="https://infosec.exchange/tags/ForwardSecrecy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ForwardSecrecy</span></a> <a href="https://infosec.exchange/tags/DH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DH</span></a> <a href="https://infosec.exchange/tags/DHE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DHE</span></a> <a href="https://infosec.exchange/tags/DiffieHellman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DiffieHellman</span></a></p>
Erik van Straten<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@adfichter" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>adfichter</span></a></span> : I'm trying to warn people for such holes.</p><p>Published earlier this month: <a href="https://www.heise.de/en/news/BSI-and-ANSSI-warn-against-VideoIdent-for-the-EU-digital-wallet-10476045.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/BSI-and-ANSSI</span><span class="invisible">-warn-against-VideoIdent-for-the-EU-digital-wallet-10476045.html</span></a> (there of course is a German version as well).</p><p>It refers to a recent joint publication (in English) by the German BSI and the French ANSSI titled:</p><p>"Remote ldentity Proofing for EUDI Wallet Onboarding: Strengthening Assurance Against Evolving Threats"</p><p>(EUDI Wallet = European Digital Identity Wallet aka EDIW aka EUDIW).</p><p>It's about the risks of VideoIdent (getting bigger every day, see e.g. <a href="https://www.theverge.com/report/714402/uk-age-verification-bypass-death-stranding-reddit-discord" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theverge.com/report/714402/uk-</span><span class="invisible">age-verification-bypass-death-stranding-reddit-discord</span></a> - not to mention AI).</p><p>However, like in their previous publication (PDF: <a href="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/ANSSI-BSI-joint-releases/ANSSI-BSI_joint-release_2023.pdf?__blob=publicationFile&amp;v=3" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bsi.bund.de/SharedDocs/Downloa</span><span class="invisible">ds/EN/BSI/Publications/ANSSI-BSI-joint-releases/ANSSI-BSI_joint-release_2023.pdf?__blob=publicationFile&amp;v=3</span></a>) they ignore one HUGE risk: AitM's (Attacker in the Middle).</p><p>The unmentioned gaping security hole here are fake websites, where people are being directed to via falsified emails, SMS, chat app messages and possibly QR-codes.</p><p>Step 1️⃣:<br>————<br>Victim (contacts AitM site as instructed)<br> |<br> | "Please give me my EDIW"<br> v<br>AitM site: contacts site below and forwards<br> |<br> | "Please give me my EDIW"<br> v<br>True EDIW identity verification site</p><p>Step 2️⃣:<br>————<br>Victim<br> ^<br> | "Please perform VideoIdent"<br> |<br>AitM site: forwards<br> ^<br> | "Please perform VideoIdent"<br> |<br>True EDIW identity verification site</p><p>Step 3️⃣:<br>————<br>Victim<br> |<br> | VideoIdent showing victim<br> v<br>AitM site: forwards<br> |<br> | VideoIdent showing victim<br> v<br>True EDIW identity verification site</p><p>Step 4️⃣:<br>————<br>Victim<br> ^<br> | "Something went wrong"<br> |<br>AitM site: stores victim's EDIW on their device<br> ^<br> | EDIW<br> |<br>True EDIW identity verification site</p><p>The same may happen to people who are tricked into *authenticating* using EDIW on AitM websites.</p><p><span class="h-card" translate="no"><a href="https://mastodon.nl/@ellent" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ellent</span></a></span> <br> </p><p><a href="https://infosec.exchange/tags/EDIW" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDIW</span></a> <a href="https://infosec.exchange/tags/EUDIW" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EUDIW</span></a> <a href="https://infosec.exchange/tags/AitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AitM</span></a> <a href="https://infosec.exchange/tags/MitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MitM</span></a> <a href="https://infosec.exchange/tags/VideoIdent" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VideoIdent</span></a> <a href="https://infosec.exchange/tags/OnlineAuthentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OnlineAuthentication</span></a> <a href="https://infosec.exchange/tags/Authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authentication</span></a> <a href="https://infosec.exchange/tags/Impersonation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Impersonation</span></a> <a href="https://infosec.exchange/tags/Identification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Identification</span></a> <a href="https://infosec.exchange/tags/IdentityFraud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityFraud</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
🧿🪬🍄🌈🎮💻🚲🥓🎃💀🏴🛻🇺🇸<p>&gt; <a href="https://mastodon.social/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> informed me that I already had a <a href="https://mastodon.social/tags/passkey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passkey</span></a> on my device. If that's the case, why didn't it work when I attempted to log into my Google account on the tablet? When I was logging into the tablet, Google should have been aware I had <a href="https://mastodon.social/tags/passkeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passkeys</span></a> on my Pixel 9 Pro and request <a href="https://mastodon.social/tags/authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentication</span></a> with either a fingerprint or face scan. It didn't. No passkey was recognized… even though it's there.</p><p>&gt; It's a recursive nightmare from which I can't seem to escape.</p><p><a href="https://www.zdnet.com/article/passkeys-wont-be-ready-for-primetime-until-google-and-other-companies-fix-this/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">zdnet.com/article/passkeys-won</span><span class="invisible">t-be-ready-for-primetime-until-google-and-other-companies-fix-this/</span></a></p><p><a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
Erik van Straten<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@tbortels" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>tbortels</span></a></span> : even if we disagree, thank you for a fair discussion.</p><p>You wrote:<br>❝Asking any third party to ensure "trust" is doomed from the start. In the history of humanity no govermnment or organization whatsoever has managed to eliminate fraud, and none ever will.❞</p><p>You are right, not for 100%. That will never be achieved; what I think is seriously needed is risk *reduction*.</p><p>By typing the toot you sent to me, you had to trust the manufacturers of hardware and software you used. You'll have to trust your bank for prudently guarding your savings. Trust is a very basic requirement in our lives, even if we are to be very disappointed now and then.</p><p>We have chambers of commerce for a reason (in my country: <a href="https://www.kvk.nl/en/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">kvk.nl/en/</span><span class="invisible"></span></a>).</p><p>Among other things, I wrote a section<br> {1} WHAT IS A DECENT WEBPKI<br>in my (long) proposal <a href="https://infosec.exchange/@ErikvanStraten/113079966331873386" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@ErikvanStrat</span><span class="invisible">en/113079966331873386</span></a> (the current CA/B forum is pointless: it's big tech for big tech, zero consumer orgs are involved).</p><p>To decrease the (enormous) impact of cybercrime, IMO we can and should provide users with as much information about a website as possible, in particular when it is the first time they visit it (or if ownership may have changed).</p><p>❝The reality is this: people need to learn basic defensive cynicism.❞</p><p>That is simpy impossible. Even I sometimes find it hard to determine whether a website is authentic (and like you, I have a lot of infosec experience - that dates back to around the time that "internet" became accessible to universities).</p><p>The web is being FLOODED with criminal websites (example: see the image below) while no big tech org cares - on the contrary, they're making money by condoning it. Guess why Google introduced zillions of stupid TLD's. There are way too many people who will not and cannot become forensic researchers.</p><p>❝The internet is just another place where doing dumb things gets you hurt, and it can't be made safe without destroying it.❞</p><p>I disagree. Like I wrote in <a href="https://infosec.exchange/@ErikvanStraten/114241359684890759" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@ErikvanStrat</span><span class="invisible">en/114241359684890759</span></a>:<br>"I am not against (free) Domain Validated certificates. They're fine if visitors do exactly know the domain name in advance, such as of your home NAS (and are not easily fooled by IDN's)."</p><p>❝Security and Trust are two different unrelated things. And people need to understand it.❞</p><p>Agreed, but we can still help them *a lot* making better decisions whom to trust. Again, I mean trust based on reputation and the ability to "see them in court" if you know who you're dealing with - in cases where that matters.</p><p><span class="h-card" translate="no"><a href="https://mastodon.scot/@UndisScot" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>UndisScot</span></a></span> </p><p><a href="https://infosec.exchange/tags/FakeWebsites" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FakeWebsites</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/BigTechIsEvil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BigTechIsEvil</span></a> <a href="https://infosec.exchange/tags/GoogleIsEvil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GoogleIsEvil</span></a> <a href="https://infosec.exchange/tags/CloudflareIsEvil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudflareIsEvil</span></a> <a href="https://infosec.exchange/tags/DV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DV</span></a> <a href="https://infosec.exchange/tags/EV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EV</span></a> <a href="https://infosec.exchange/tags/Certificates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Certificates</span></a> <a href="https://infosec.exchange/tags/Authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authentication</span></a> <a href="https://infosec.exchange/tags/Impersonation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Impersonation</span></a></p>
Grumpy Website<p>This dialog always confuses me. I have to read small print to really understand what does it want</p><p><a href="https://mastodon.online/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> <a href="https://mastodon.online/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> <a href="https://mastodon.online/tags/Dialog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Dialog</span></a> <a href="https://mastodon.online/tags/VisualHierarchy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VisualHierarchy</span></a> <a href="https://mastodon.online/tags/Fingerprint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fingerprint</span></a> <a href="https://mastodon.online/tags/Authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authentication</span></a></p>
Serge from Babka<p>Another approach would be if Alice could generate multiple Passkeys and hand them out to individuals she trusts, and then retaining the ability to revoke them. Sadly many sites don't yet support Passkeys, and this model still lets someone like Mal revoke Alice's access, so that's not great.</p><p>Bitwarden has a feature whereby Alice can share a password with Eve but not let her see it or export it. This could work pretty well, except that if the site requires 2FA from a SMS text message (vs TOTP or a token) or if Eve has the knowhow to intercept the password.</p><p>I still think that what we ultimately want is attenuated scopes because then we can track all actions by the delegated party.</p><p>I do wonder if this need is niche or if the current solution of "good faith password sharing" works well enough often enough that it's not risen to the level of concern for developers.</p><p>2/2</p><p><a href="https://babka.social/tags/Authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authentication</span></a> <a href="https://babka.social/tags/Authorization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authorization</span></a> <a href="https://babka.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://babka.social/tags/Passwords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Passwords</span></a> <a href="https://babka.social/tags/Passwordless" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Passwordless</span></a> <a href="https://babka.social/tags/Programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Programming</span></a></p>
Serge from Babka<p>I've been thinking about delegated authority on websites lately.</p><p>It would be convenient if I could delegate certain functions to people, for example allowing someone like my accountant to have access to some of my financial records.</p><p>Some organizations make this easy, allowing me to have multiple accounts.</p><p>Other services don't offer this, nor do they offer any kind of OAuth type of delegated authorization or capabilities model.</p><p>I've been thinking about ways around this.</p><p>One very wacky way would be if Alice could have a a "special browser" that would tie into some service she runs. Bob would log in with his credentials and then behind the scenes the application logs in as Alice.</p><p>This would be very complicated to implement though.</p><p>1/</p><p><a href="https://babka.social/tags/Authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authentication</span></a> <a href="https://babka.social/tags/Authorization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authorization</span></a> <a href="https://babka.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://babka.social/tags/Passwords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Passwords</span></a> <a href="https://babka.social/tags/Passwordless" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Passwordless</span></a> <a href="https://babka.social/tags/Programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Programming</span></a></p>
Strypey<p>The UX of 2FA could be improved considerably, and security along with it, by using a circles of trust model.</p><p>Take the example of a code forge, hosting the canonical version of some crucial piece of kit like the Linux kernel, OpenSSL, or GnuPG. You would want a maintainer to be 100% authenticated before they can commit changes to these repositories. Basic security culture.</p><p>But ...</p><p>(1/2)</p><p><a href="https://mastodon.nzoss.nz/tags/2FA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2FA</span></a> <a href="https://mastodon.nzoss.nz/tags/authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentication</span></a></p>
PrivacyDigest<p>Critical <a href="https://mas.to/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> 2 <a href="https://mas.to/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> has been under active <a href="https://mas.to/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> for weeks</p><p>A critical vulnerability allowing <a href="https://mas.to/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> to bypass <a href="https://mas.to/tags/multifactor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>multifactor</span></a> <a href="https://mas.to/tags/authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentication</span></a> in network management devices made by <a href="https://mas.to/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> has been actively <a href="https://mas.to/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a> for more than a month, researchers said. The finding is at odds with advisories from the vendor saying there is no evidence of in-the-wild <a href="https://mas.to/tags/exploitation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploitation</span></a>.<br><a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p><p><a href="https://arstechnica.com/security/2025/07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/</span></a></p>
Bill<p>Spike in credential theft. Probably comes as no surprise to anyone. Use MFA!</p><p><a href="https://www.infosecurity-magazine.com/news/hackers-target-employee-credentials/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">infosecurity-magazine.com/news</span><span class="invisible">/hackers-target-employee-credentials/</span></a></p><p><a href="https://infosec.exchange/tags/authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentication</span></a> <a href="https://infosec.exchange/tags/mfa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mfa</span></a></p>
Erik van Straten<p><span class="h-card" translate="no"><a href="https://sw-development-is.social/@maaikees" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>maaikees</span></a></span> : the way we look is an important part of how we are (and want to be) recognized by others.</p><p>Over the years I became amazed about how the looks of peoples heads differ, and how enormously good people are at recognizing each other.</p><p>Changing how you look changes your identity - as others see it.</p><p><a href="https://infosec.exchange/tags/Identity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Identity</span></a> <a href="https://infosec.exchange/tags/Identification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Identification</span></a> <a href="https://infosec.exchange/tags/Impersonation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Impersonation</span></a> <a href="https://infosec.exchange/tags/Authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authentication</span></a> <a href="https://infosec.exchange/tags/Authenticity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authenticity</span></a></p>
Erik van Straten<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@relishthecracker" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>relishthecracker</span></a></span> : that's make belief.</p><p>"Wow, asymmetric encryption, even quantum-computer-proof", "military-grade", etcetera.</p><p>Right after logging in using a passkey with an unbreakably protected private key, the website sends a session cookie (or similar) to the browser - which is NOT protected like private keys. If a website (like most of them) does not log you out if your IP-address changes, such a cookie is nearly as bad as a password. And fully if the cookie never expires.</p><p>Therefore:</p><p>1️⃣ Even if attackers cannot copy private keys: if the user device is sufficiently compromised (i.e. on Android, running an accessibility service), they can take over all of the user's accounts;</p><p>2️⃣ If the user's browser is compromised, attackers can copy session cookies and use them to obtain access to accounts the user logs in to;</p><p>3️⃣ An AitM (Attacker in the Middle) using a malicious website can copy/steal authentication cookies. Such AitM-attacks are possible in at least the following cases if either:</p><p>• A malicious third party website manages to obtain a fraudulently issued certificate (examples: <a href="https://infosec.exchange/@ErikvanStraten/112914050216821746" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@ErikvanStrat</span><span class="invisible">en/112914050216821746</span></a>);</p><p>• An attacker obtains unauthorised write access to the website's DNS record;</p><p>• An attacker manages to obtain access to a server where a "dangling" (forgotten) subdomain name points to, *AND* the real authenticating server (RP) does not carefully check for allowed subdomains (see <a href="https://github.com/w3ctag/design-reviews/issues/97#issuecomment-175766580" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/w3ctag/design-revie</span><span class="invisible">ws/issues/97#issuecomment-175766580</span></a>);</p><p>4️⃣ The server is compromised or has a rogue admin: the attacker can add their passkey's public key to your account, or replace your public key with theirs (note that passkey pubkeys are not encapsulated by certificates issued by trusted issuers, stating who owns the public key).</p><p>Phishing using fake websites is probably the number one problem on the internet. *THE* major advantage of passkeys is that they make phishing attacks VERY HARD.</p><p>Indeed, if your device is sufficiently compromised, the risk of all of your passwords being stolen if you use a password manager is BIG.</p><p>However, as I wrote, if your device is sufficiently compromised, an attacker does not need access to your private keys in order to obtain access to your accounts.</p><p><span class="h-card" translate="no"><a href="https://sigmoid.social/@oliversampson" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>oliversampson</span></a></span> <span class="h-card" translate="no"><a href="https://cathode.church/@kaye" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>kaye</span></a></span> </p><p><a href="https://infosec.exchange/tags/Passkeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Passkeys</span></a> <a href="https://infosec.exchange/tags/PasswordManagers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PasswordManagers</span></a> <a href="https://infosec.exchange/tags/DomainNames" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DomainNames</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/AitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AitM</span></a> <a href="https://infosec.exchange/tags/MitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MitM</span></a> <a href="https://infosec.exchange/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a> <a href="https://infosec.exchange/tags/MilitaryGrade" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MilitaryGrade</span></a> <a href="https://infosec.exchange/tags/Authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authentication</span></a> <a href="https://infosec.exchange/tags/Impersonation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Impersonation</span></a> <a href="https://infosec.exchange/tags/FakeWebsites" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FakeWebsites</span></a> <a href="https://infosec.exchange/tags/ATO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ATO</span></a> <a href="https://infosec.exchange/tags/AccountTakeOver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AccountTakeOver</span></a> <a href="https://infosec.exchange/tags/Passwords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Passwords</span></a> <a href="https://infosec.exchange/tags/SharedSecrets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharedSecrets</span></a> <a href="https://infosec.exchange/tags/AsymmetricCryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AsymmetricCryptography</span></a> <a href="https://infosec.exchange/tags/SubDomains" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SubDomains</span></a> <a href="https://infosec.exchange/tags/DanglingSubDomains" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DanglingSubDomains</span></a></p>
Mad A. Argon :qurio:<p>Thought it is high time to finally set <a href="https://is-a.cat/tags/2FA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2FA</span></a> on my <a href="https://is-a.cat/tags/DeviantArt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeviantArt</span></a> account... Turned out it's premium feature for paid accounts :neocatBlushHide:</p><p><a href="https://is-a.cat/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://is-a.cat/tags/authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentication</span></a></p>
Teodor Sandu<p><a href="https://mastodon.online/tags/funny" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>funny</span></a> <a href="https://mastodon.online/tags/meme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>meme</span></a> <a href="https://mastodon.online/tags/authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentication</span></a> <a href="https://mastodon.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.online/tags/it" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>it</span></a> <a href="https://mastodon.online/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a> <a href="https://mastodon.online/tags/development" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>development</span></a> <a href="https://mastodon.online/tags/fun" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fun</span></a> <a href="https://mastodon.online/tags/memes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>memes</span></a> <a href="https://mastodon.online/tags/joke" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>joke</span></a> <a href="https://mastodon.online/tags/jokes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jokes</span></a> <a href="https://mastodon.online/tags/dev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dev</span></a> <a href="https://mastodon.online/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.online/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>