Comment by lrvick
3 years ago
> Those can all easily be emulated in software, if you're determined enough.
Not possible if vendor signature checking is enforced. All major webauthn device manufacturers sign the keys of all the devices they produce. You can prove a given device is unique and issued by Apple, Yubico, Google, Microsoft, etc.
No comments yet
Contribute on Hacker News ↗