Twitter | Pretraživanje | |
Pretraživanje Osvježi
Bitdefender 6. ožu
Could this be the end of ? The and the announce that is now an official web standard.
Reply Retweet Označi sa "sviđa mi se"
W3C 13. lip
The WebAuthn WG has published a First Public Working Draft of Web Authentication: An API for accessing Public Key Credentials Level 2 enabling the creation and use of strong, attested, scoped, public key-based credentials by web applications
Reply Retweet Označi sa "sviđa mi se"
Duo Labs 13. velj
Yet more open source goodness being released from today, this time in the form of an Android Webauthn Authenticator Library. More details here: Code here:
Reply Retweet Označi sa "sviđa mi se"
block.one 17. sij
Ready to implement ? Build today using our example app.
Reply Retweet Označi sa "sviđa mi se"
block.one 16. sij
Developers can now test application support for and Elliptic Cryptography with EOSJS 21.0.0. .
Reply Retweet Označi sa "sviđa mi se"
j wendy spies 12 h
Excited to announce our new offering of a service-based solution for enterprises in need of a simple and efficient way to purchase & deliver YubiKeys at scale: YubiEnterprise Services.
Reply Retweet Označi sa "sviđa mi se"
hopr 12 h
Do tech solutions to the problem (like ) rob Users of personal autonomy? Automation offers convenience, but often sacrifices user control and involvement. can deliver personalization, strength, and preserve User autonomy.
Reply Retweet Označi sa "sviđa mi se"
Martin Gansel 18 h
Besser wäre überhaupt keine mehr einzusetzen. Leider ist die Verbreitung von bzw. nur mäßig.
Reply Retweet Označi sa "sviđa mi se"
Vika 3. velj
OK turns out one library that fully implements only works with Express framework which I don’t use because I have which serves as my framework. This is so confusing… I don’t like it. Any framework-agnostic JS WebAuthn solutions?
Reply Retweet Označi sa "sviđa mi se"
W3C Developers 3. velj
Odgovor korisniku/ci @w3c @Cisco
26 Feb.: The meets in 🇺🇸, hosted by . Find the meeting agenda at
Reply Retweet Označi sa "sviđa mi se"
Vika 3. velj
Tryna grok since I got a for it. Confusing. Definitely confusing!
Reply Retweet Označi sa "sviđa mi se"
sebbo 3. velj
Odgovor korisniku/ci @heytobey
Kein Fan. Gibt mittlerweile geilere Technologien.
Reply Retweet Označi sa "sviđa mi se"
Steve Waterhouse 3. velj
Reply Retweet Označi sa "sviđa mi se"
luigitecnologo 3. velj
Basta meravigliarsi dello e dei conti prosciugati c'è uno standard che le banche dovrebbero adottare immediatamente ed è 🔑
Reply Retweet Označi sa "sviđa mi se"
Felix Magedanz 3. velj
Odgovor korisniku/ci @conorgil @jimfenton @rmondello
I’m in favor of the proposal, even though my startup focuses on & . SMS OTP will be used broadly for many years to come due to its simple implementation and use. CC
Reply Retweet Označi sa "sviđa mi se"
Conor Gilsenan 2. velj
Odgovor korisniku/ci @jimfenton
They all have vulnerabilities. By that logic, the only thing anyone should use is since it is strongest, but it has it's own issues. Sadly, SMS 2FA will be here for years. Why not implement low hanging fruit to improve the usability & security for users right now?
Reply Retweet Označi sa "sviđa mi se"
Joon Hyuk Lee 1. velj
독일에 거주하고 있는 대학원 학생이 개발자들의 입장에서 에 중요한 요소 중 하나인 사용편의성에 대한 논문을 쓰고 있답니다. 보다 자세한 정보 확인이나 피드백을 통한 참여를 희망하신다면 아래 링크를 방문해 보세요.
Reply Retweet Označi sa "sviđa mi se"
OneLogin 31. sij
Weak passwords leave your company vulnerable. helps organizations ditch passwords for more modern authentication. Check out this webinar with for more info:
Reply Retweet Označi sa "sviđa mi se"
Sander Goudswaard 31. sij
Say hello to OpenSK: a fully open-source key implementation
Reply Retweet Označi sa "sviđa mi se"
Matteo 31. sij
how would you see supporting and in general?
Reply Retweet Označi sa "sviđa mi se"