惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

N
News and Events Feed by Topic
Malwarebytes
Malwarebytes
Threat Intelligence Blog | Flashpoint
Threat Intelligence Blog | Flashpoint
C
Cybersecurity and Infrastructure Security Agency CISA
F
Future of Privacy Forum
C
Cisco Blogs
T
The Exploit Database - CXSecurity.com
A
Arctic Wolf
S
Securelist
K
Kaspersky official blog
S
Schneier on Security
T
ThreatConnect
T
Tenable Blog
Spread Privacy
Spread Privacy
T
True Tiger Recordings
AWS News Blog
AWS News Blog
F
Fox-IT International blog
量子位
T
Threatpost
V
Vulnerabilities – Threatpost
C
CERT Recently Published Vulnerability Notes
Cisco Talos Blog
Cisco Talos Blog
GbyAI
GbyAI
宝玉的分享
宝玉的分享
腾讯CDC
G
Google Developers Blog
aimingoo的专栏
aimingoo的专栏
Cyberwarzone
Cyberwarzone
有赞技术团队
有赞技术团队
S
SegmentFault 最新的问题
OSCHINA 社区最新新闻
OSCHINA 社区最新新闻
V
Visual Studio Blog
U
Unit 42
雷峰网
雷峰网
cs.CV updates on arXiv.org
cs.CV updates on arXiv.org
Simon Willison's Weblog
Simon Willison's Weblog
O
OpenAI News
freeCodeCamp Programming Tutorials: Python, JavaScript, Git & More
The GitHub Blog
The GitHub Blog
The Register - Security
The Register - Security
MyScale Blog
MyScale Blog
小众软件
小众软件
A
About on SuperTechFans
Last Week in AI
Last Week in AI
Y
Y Combinator Blog
博客园 - 三生石上(FineUI控件)
美团技术团队
Google Online Security Blog
Google Online Security Blog
P
Proofpoint News Feed
MongoDB | Blog
MongoDB | Blog

Hacker News: Front Page

The political polarization of health outcomes in the USA Ask HN: Why didn't the C64 come with Simons' BASIC in the box from 1983 onward? Australia Four-Day Work Week Study Data Shows Boosted Productivity Defeating Git Rigour Fatigue with Jujutsu 2009 Aftonbladet Israel Controversy Migrating from Go to Rust Claude Is Not Your Architect. Stop Letting It Pretend. CBP updated its electronic device search directive in Jan 2026 Don't know where your data is from? Bayesian modeling for unknown coordinates Senior Frontend Engineer at Flick | Y Combinator AI Chip Component Costs: Memory at 63% | Epoch AI Ruby for Good When (if ever) it's appropriate to make jokes before the US Supreme Court Computer and coding books from Usborne | Usborne | Be Curious No Juniors Today, No Seniors in 2031 abyss * your_dotfiles_are_not_a_distro The seed oil panic is hurting my cardiac patients FreeBSD Foundation Executive Director Tries Daily Driving FreeBSD On Laptop Bringing BASIC back: Microsoft’s 6502 BASIC is now Open Source DeepSeek reasonix, DeepSeek native coding agent with high caching and low cost Childhood Computing - Susam Pal What Matters in Practical Learned Image Compression Mastering Dyalog APL — Mastering Dyalog APL The Worlds Left To Conquer — Ludicity Greg Brockman: Inside the 72 Hours That Almost Killed OpenAI All Lean Books And Where To Find Them ‘AI washing’: firms are scrambling to rebrand themselves as tech-focused Toise Amazon Web Services - Four Years and Out The C++ Standard Library Has Been Walking Itself Back for Fifteen Years AMD Customer Community (Now Go Bang!) The C64 Dead Test Font How Alexander Grothendieck Revolutionized 20th-Century Mathematics | Quanta Magazine The day my ping took countermeasures Shooting near White House: Suspect killed after opening fire on Secret Service agents Justice Department scrubs website of news releases about Jan. 6 defendants | AP News wake up! 16b 声明式部分更新 | Blog | Chrome for Developers VC Dimension and the Fundamental Theorem of Statistical Learning — from Scratch ICE Awards $25 Million Iris-Scanning Contract to Bi2 Technologies my i3-emacs integration Image - Bun Don't Roll Your Own ... Byrne's Euclid Toxic chemical leak at a manufacturing facility in Orange County Google I/O 2026: Software engineering at the tipping point A self-powered computer in actual credit-card size (~1mm thick) Pardon MIE? - ironPeak Blog Air France and Airbus found guilty of manslaughter over 2009 plane crash GitHub - DamRsn/NeuralNote: Audio Plugin for Audio to MIDI transcription using deep learning. It's time to talk about my writerdeck Texas woman arrested for Facebook post about town water quality Iowa lawmakers move to mandate students take Center for Intellectual Freedom classes amid low enrollment JWT is a scam and your app doesn't need it Reverse engineering circuitry in a Spacelab computer from 1980 Evaluating SPEC CPU2026 Show HN: I built a RAG and knowledge graph agent that runs locally Italy moves to Airbus A330 tankers in major NATO-aligned shift Lisp in Vim - Susam Pal z386: An Open-Source 80386 Built Around Original Microcode Oura says it gets government demands for user data. Will it share how many? On the <dl> The Art of Money Getting – Cool Tools The spell that wouldn't leave · mahl.me 80386 microcode disassembled « Reenigne blog Judson's Last Ride $100 CPU Shootout: Comparing the Ryzen 5 5500, Core i3-14100F, and Core i3-12100F to find the top DDR4 CPU twitter.com Making Deep Learning go Brrrr From First Principles DHS Quits Granting Green Cards–Almost DeepSeek 将对其旗舰 AI 模型实施永久性 75% 折扣 US tech firms share Dutch regulator officials’ names with senate The FBI Wants ‘Near Real-Time’ Access to US License Plate Readers -​-dangerously-skip-reading-code BambuStudio has been violating PrusaSlicer AGPL license since their fork We're pausing new challenges Spanish Court Declines to Fine NordVPN over LaLiga Piracy Blocking Order GitHub - amatsuda/rubish The White House is ordering agencies to place its new app on all employees’ government phones Google Is Killing ChromeOS: Aluminium OS, Its Android-Based Replacement New rule requires most green-card applicants to apply from outside U.S. Is AI Profitable Yet? FBI director&#x27;s Based Apparel site has been spotted hosting a &#x27;ClickFix&#x27; attack TikTok disproportionately served anti-Democratic videos during the 2024 election SpaceX successfully launches prototype of Starship rocket SpaceX just launched Starship V3 &mdash; its most powerful megarocket yet &mdash; into space for the 1st time in… GitHub - bkawa-bot/planet-maiko: A local dev tool where your agents are weird alien dogs. Would you let them in? Why We&#x27;ve Filed a Referendum Don't just 'quote' the AI Ebola outbreak now third largest recorded and "spreading rapidly" Client Challenge Shipping a Laptop to a Refugee Camp in Uganda Hengefinder: Finding When the Sun Aligns With Your Street Green Card Seekers Must Leave U.S. to Apply, Trump Administration Says GitHub - anomalyco/models.dev: An open-source database of AI models. Staged publishing and new install-time controls for npm AI users re-create dead pilots’ voices from crash investigation docs Linux Sound Subsystem Also Seeing Many Fixes Driven By AI/LLMs Project Glasswing: An initial update USCIS Will Grant 'Adjustment of Status' Only in Extraordinary Circumstances
Understanding WebAuthn credential protection policy
mooreds · 2026-05-25 · via Hacker News: Front Page

This post assumes you're already familiar with the basics of WebAuthn.

When creating a WebAuthn credential, you can specify whether it should be discoverable using the residentKey option.

const credential = await navigator.credentials.create({
	publicKey: {
		authenticatorSelection: {
			residentKey: "required",
			// ...
		},
		// ...
	},
});

However, the relying party cannot control when or how the credential can be discovered. You may want it to become discoverable only after user verification and hide the account’s existence from snooping users. This can be especially important for security keys, where unlike devices or password managers that usually require initial authentication, physical possession alone is often sufficient to reveal registered credentials. To address this, the CTAP 2.1 specification defines a new credential protection extension, available through the credentialProtectionPolicy extension input. CTAP is the specification that defines how platforms (devices/browsers) and roaming authenticators (security keys) interact.

const credential = await navigator.credentials.create({
	publicKey: {
		extensions: {
			credentialProtectionPolicy: "userVerificationRequired",
			enforceCredentialProtectionPolicy: true,
		},
		// ...
	},
});

If the default value userVerificationOptional is used, the credential can be discovered and used without user verification. If userVerificationOptionalWithCredentialIDList is used, the credential cannot be discovered without user verification, but it can still be discovered and used without user verification if the credential ID is provided by the relying party. This matches the security of non-discoverable credentials. Finally, userVerificationRequired indicates that the credential cannot be discovered or used without user verification.

It’s important to highlight that the extension controls credential discovery within the authenticator. It is still up to the relying party to verify whether the assertion was made with user verification if they require it.

The related enforceCredentialProtectionPolicy extension input configures what should happen if the authenticator does not support credential protection policy. If set to true, the operation will fail if it cannot create a credential at the specified security level. Note that if you use a non-roaming authenticator that does not support credentialProtectionPolicy but the browser does, the request will be rejected. As such, this should only be set to true if you want to allow roaming authenticators.

As for browser support for the extension inputs, Chrome and Firefox support them, while Safari does not and will simply ignore them.

Browsers can also silently apply a default value if the relying party does not specify one, which is specifically the case in Chrome.

If residentKey is preferred or required, Chrome uses userVerificationOptionalWithCredentialIDList. As noted, this helps prevent someone with physical access to the authenticator from seeing which accounts are registered on it.

If residentKey is required and userVerification is preferred, Chrome will use userVerificationRequired instead. The confusing part is that this is not related to credential discovery, but rather serves as a safety measure to enforce user verification. Chrome assumes the credential is likely to be used as a single authentication step, since preferred is commonly used even for passkey authentication. However, because user verification is still optional and it is up to the relying party to check for it, if the server does not properly enforce user verification during authentication, someone could sign in as the user with only physical access to the authenticator.

The specific behavior is documented in the Chromium documentation.