logoalt Hacker News

Tharreyesterday at 10:27 PM1 replyview on HN

> do not control the signing key which is ultimately used to associate app <-> domain <-> passkey, and they do not control the system credentials service which checks this association.

You're assuming the attacker must go through the credential manager and the backing hardware, but that is only the case with attestation. Without it, the attacker can simply generate their own passkey in software, because the backend on the banks side would have no way of telling where the passkey came from.


Replies

tadfisheryesterday at 10:52 PM

How did the service authenticate the user in order to create the new credential within the attacker-controlled app?

show 1 reply