Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It is not based on TB but it is heavily informed by those efforts. See here: https://github.com/w3c/webappsec-dbsc#what-makes-device-boun...

However, DBSC as an API and protocol is similarly agnostic about key storage. There is no attestation and the User Agent is fully responsible for selecting key storage that provides the best protection.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: