Skip to content

Conversation

@simoneonofri
Copy link
Contributor

@simoneonofri simoneonofri commented Jan 8, 2026

This section contains the list of in-scope and out-of-scope threats.

For more context, please refer to the Google Doc containing the Threat Model (which will be published as separate Notes) and the complete Section.

Closes #???

The following tasks have been completed:

  • Modified Web platform tests (link)

Implementation commitment:

  • WebKit (link to issue)
  • Chromium (link to issue)
  • Gecko (link to issue)

Documentation and checks

  • Affects privacy
  • Affects security
  • Pinged MDN
  • Updated Explainer
  • Updated digitalcredentials.dev

Preview | Diff

This section contains the list of in-scope and out-of-scope threats. The full analysis is in the separate Threat Model.

For more context, please refer to the [Google Doc](https://docs.google.com/document/d/1BpBBiv7GgkGi1_Y7NvyD3Mkalj0g857Qw-aan3NqYwU/edit?tab=t.dilz864boly) containing the Threat Model (which will be published as separate Notes) and the complete Section.
<p>Further analysis and threats are specified in related Threat Models, such as the Threat Model for
Decentralized Credentials (at the ecosystem level for Decentralized Identities), the Threat Model for the
Web (at the web ecosystem level), RFC 3552 (at the internet level), and the FIDO Security Reference (since
the CTAP protocol is used for cross-device flow).</p>
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
the CTAP protocol is used for cross-device flow).</p>
CTAP — the Client to Authenticator Protocol — is used for cross-device flow).</p>

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants