Skip to content

Conversation

@simoneonofri
Copy link
Contributor

@simoneonofri simoneonofri commented Jan 8, 2026

Secure Context

  • Adding the related threat as "in-scope"
  • Adding Secure Context as the mitigation of the threat

For more context, please refer to the Google Doc containing the Threat Model (which will be published as separate Notes) and the complete Section.

Closes #???

The following tasks have been completed:

  • Modified Web platform tests (link)

Implementation commitment:

  • WebKit (link to issue)
  • Chromium (link to issue)
  • Gecko (link to issue)

Documentation and checks

  • Affects privacy
  • Affects security
  • Pinged MDN
  • Updated Explainer
  • Updated digitalcredentials.dev

Preview | Diff

Security properties and mitigations - Secure Context

For more context, please refer to the [Google Doc](https://docs.google.com/document/d/1BpBBiv7GgkGi1_Y7NvyD3Mkalj0g857Qw-aan3NqYwU/edit?tab=t.dilz864boly) containing the Threat Model (which will be published as separate Notes) and the complete Section.
@simoneonofri simoneonofri added security-considerations agenda+ Add to the weekly agenda labels Jan 8, 2026
@simoneonofri simoneonofri changed the base branch from main to security-introduction January 10, 2026 14:06
behavior only when mediating credential presentation and issuance.
</p>
<p>
Other security properties that depend on protocols, Wallet
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Other security properties that depend on protocols, Wallet
Other security properties that depend on protocols, wallet

ecosystem level for Decentralized Identities), the Threat Model for
the Web (at the web ecosystem level), RFC 3552 (at the internet
level), and the FIDO Security Reference, since the FIDO's Client to
Authenticator Protocol (CTAP) protocol is used for cross-device flow.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Authenticator Protocol (CTAP) protocol is used for cross-device flow.
Authenticator Protocol (CTAP) is used for cross-device flow.

<a href=
"https://github.com/w3c-cg/threat-modeling/blob/main/models/decentralized-identities.md">
Threat Model for Decentralized Identities</a>
<li>Out-of-Scope threats handled by protocols, Wallets, OS platform
Copy link
Contributor

@TallTed TallTed Jan 13, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
<li>Out-of-Scope threats handled by protocols, Wallets, OS platform
<li>Out-of-scope threats handled by protocols, wallets, OS platform

mediation role:
</p>
<ul>
<li><strong>T1</strong>: Presentation Request Modification (Tampering) — A malicious script or compromised page attempts to alter a DigitalCredentialGetRequest before processing.</li>
Copy link
Contributor

@TallTed TallTed Jan 13, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
<li><strong>T1</strong>: Presentation Request Modification (Tampering) — A malicious script or compromised page attempts to alter a DigitalCredentialGetRequest before processing.</li>
<li><strong>T1</strong>: Presentation Request Modification (Tampering) —
A malicious script or compromised page attempts to alter a
DigitalCredentialGetRequest before processing.</li>

"https://github.com/w3c-cg/threat-modeling/blob/main/models/decentralized-identities.md">
Threat Model for Decentralized Identities</a>
<li>Out-of-Scope threats handled by protocols, Wallets, OS platform
security, or transport layers. Even if Out-of-Scope, they are
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
security, or transport layers. Even if Out-of-Scope, they are
security, or transport layers. Even if out-of-scope, they are

</p>
<section>
<h4>Secure Context</h4>
<p>WebIDL [=interfaces=] of the Digital Credential API are only exposed in a Secure Context, thus reducing [=tampering=].</p>
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
<p>WebIDL [=interfaces=] of the Digital Credential API are only exposed in a Secure Context, thus reducing [=tampering=].</p>
<p>WebIDL [=interfaces=] of the Digital Credential API are only exposed in a
Secure Context, thus reducing [=tampering=].</p>

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

agenda+ Add to the weekly agenda security-considerations

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants