I would add two more questions to the list, @rlin1: - How do RP's protect against a scalable attack/vulnerability on the "synched" implementation? - Who bears responsibility for violations to privacy regulations when a "synch" provider's implementation is compromised? -- GitHub Notification of comment by arshadnoor Please view or discuss this issue at https://github.com/w3c/webauthn/issues/1640#issuecomment-875527525 using your GitHub account -- Sent via github-notify-ml as configured in https://github.com/w3c/github-notify-ml-configReceived on Wednesday, 7 July 2021 11:33:25 UTC
This archive was generated by hypermail 2.4.0 : Tuesday, 5 July 2022 07:26:44 UTC