- From: W3C Webmaster via GitHub API <sysbot+gh@w3.org>
- Date: Tue, 15 Sep 2020 17:00:38 +0000
- To: public-webauthn@w3.org
- Message-Id: <E1kIEJq-0004AY-Fr@uranus.w3.org>
Issues ------ * w3c/webauthn (+0/-2/💬10) 2 issues received 10 new comments: - #1477 need "how to install bikeshed in one's local webauthn repo clone" instructions (1 by equalsJeffH) https://github.com/w3c/webauthn/issues/1477 [type:process] - #1457 New platform authenticators are making discoverable credentials regardless of residentKey=false passed to Create() (9 by arianvp, equalsJeffH, sbweeden) https://github.com/w3c/webauthn/issues/1457 [stat:Discuss] [type:technical] 2 issues closed: - The risk of attacker may can identify whether if the account support FIDO or not https://github.com/w3c/webauthn/issues/1475 [stat:pr-open] [type:editorial] - Virtual authenticator support for extensions https://github.com/w3c/webauthn/issues/1471 [stat:pr-open] [type:technical] Pull requests ------------- * w3c/webauthn (+2/-3/💬6) 2 pull requests submitted: - Add note about fixed/empty user handles (by agl) https://github.com/w3c/webauthn/pull/1483 - Remove the Psuedo-Random Function extension (by jcjones) https://github.com/w3c/webauthn/pull/1481 5 pull requests received 6 new comments: - #1483 Add note about fixed/empty user handles (2 by agl, lgarron) https://github.com/w3c/webauthn/pull/1483 - #1480 Add security consideration on detecting non-WebAuthn accounts (1 by equalsJeffH) https://github.com/w3c/webauthn/pull/1480 [subtype:RP-impl-cons] [type:editorial] - #1476 Update "feature policy" refs to new name "permissions policy" (#1473) (1 by jcayzac) https://github.com/w3c/webauthn/pull/1476 [type:editorial] - #1474 Abstracting the concept of Privacy CA/Attestation CA into Anonymization CA (1 by equalsJeffH) https://github.com/w3c/webauthn/pull/1474 [subtype:attestation] [type:editorial] - #1470 Make largeBlobs explicit during create. (1 by agl) https://github.com/w3c/webauthn/pull/1470 [type:editorial] [type:technical] 3 pull requests merged: - Add security consideration on detecting non-WebAuthn accounts https://github.com/w3c/webauthn/pull/1480 [subtype:RP-impl-cons] [type:editorial] - Update .spec-data .bikeshed-include cache https://github.com/w3c/webauthn/pull/1479 [type:process] - Virtual authenticators extension support https://github.com/w3c/webauthn/pull/1472 [subtype:FeatureProposal] [type:technical] Repositories tracked by this digest: ----------------------------------- * https://github.com/w3c/webauthn -- Sent via github-notify-ml as configured in https://github.com/w3c/github-notify-ml-config
Received on Tuesday, 15 September 2020 17:00:40 UTC