-
Notifications
You must be signed in to change notification settings - Fork 30
Security Considerations: Secure Context #426
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: security-introduction
Are you sure you want to change the base?
Conversation
Security properties and mitigations - Secure Context For more context, please refer to the [Google Doc](https://docs.google.com/document/d/1BpBBiv7GgkGi1_Y7NvyD3Mkalj0g857Qw-aan3NqYwU/edit?tab=t.dilz864boly) containing the Threat Model (which will be published as separate Notes) and the complete Section.
| behavior only when mediating credential presentation and issuance. | ||
| </p> | ||
| <p> | ||
| Other security properties that depend on protocols, Wallet |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| Other security properties that depend on protocols, Wallet | |
| Other security properties that depend on protocols, wallet |
| ecosystem level for Decentralized Identities), the Threat Model for | ||
| the Web (at the web ecosystem level), RFC 3552 (at the internet | ||
| level), and the FIDO Security Reference, since the FIDO's Client to | ||
| Authenticator Protocol (CTAP) protocol is used for cross-device flow. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| Authenticator Protocol (CTAP) protocol is used for cross-device flow. | |
| Authenticator Protocol (CTAP) is used for cross-device flow. |
| <a href= | ||
| "https://github.com/w3c-cg/threat-modeling/blob/main/models/decentralized-identities.md"> | ||
| Threat Model for Decentralized Identities</a> | ||
| <li>Out-of-Scope threats handled by protocols, Wallets, OS platform |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| <li>Out-of-Scope threats handled by protocols, Wallets, OS platform | |
| <li>Out-of-scope threats handled by protocols, wallets, OS platform |
| mediation role: | ||
| </p> | ||
| <ul> | ||
| <li><strong>T1</strong>: Presentation Request Modification (Tampering) — A malicious script or compromised page attempts to alter a DigitalCredentialGetRequest before processing.</li> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| <li><strong>T1</strong>: Presentation Request Modification (Tampering) — A malicious script or compromised page attempts to alter a DigitalCredentialGetRequest before processing.</li> | |
| <li><strong>T1</strong>: Presentation Request Modification (Tampering) — | |
| A malicious script or compromised page attempts to alter a | |
| DigitalCredentialGetRequest before processing.</li> |
| "https://github.com/w3c-cg/threat-modeling/blob/main/models/decentralized-identities.md"> | ||
| Threat Model for Decentralized Identities</a> | ||
| <li>Out-of-Scope threats handled by protocols, Wallets, OS platform | ||
| security, or transport layers. Even if Out-of-Scope, they are |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| security, or transport layers. Even if Out-of-Scope, they are | |
| security, or transport layers. Even if out-of-scope, they are |
| </p> | ||
| <section> | ||
| <h4>Secure Context</h4> | ||
| <p>WebIDL [=interfaces=] of the Digital Credential API are only exposed in a Secure Context, thus reducing [=tampering=].</p> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| <p>WebIDL [=interfaces=] of the Digital Credential API are only exposed in a Secure Context, thus reducing [=tampering=].</p> | |
| <p>WebIDL [=interfaces=] of the Digital Credential API are only exposed in a | |
| Secure Context, thus reducing [=tampering=].</p> |
Secure Context
For more context, please refer to the Google Doc containing the Threat Model (which will be published as separate Notes) and the complete Section.
Closes #???
The following tasks have been completed:
Implementation commitment:
Documentation and checks
Preview | Diff