About 14 results
Open links in new tab
  1. authentication - Could SQRL really be as secure as they say ...

    Regarding phishing the sqrl protocol could be much safer than passwords as browsers could flag sqrl login codes not belonging to the site you are on as a problem, without knowing your sqrl identity or …

  2. authentication - Information Security Stack Exchange

    Aug 22, 2019 · I just learned about FIDO2 (WebAuthn) and try to make a comparison to the lesser-known novel SQRL authentication scheme. Both seem to use the same key elements: a private, user …

  3. How does the MITM (Man in the middle) attack happen with respect to …

    7 The MITM-related issue with SQRL derives from the fact that the authentication request and response happen across two different channels, and an attacker can successfully conduct a valid …

  4. Secure way to log in to a website on someone else's computer

    Nov 30, 2018 · SQRL is not yet widely adopted, but this precise use case was designed in from the beginning. (The other main use case is a SQRL app on your computer working in concert with the …

  5. Newest 'sqrl' Questions - Information Security Stack Exchange

    Aug 22, 2019 · SQRL - Secure, Quick, Reliable Login - is an open draft for user authentication. Have there been "enough" publicly available tests to make any backed statements about the security of …

  6. FIDO: what is the benefit of the challenge parameter?

    Feb 20, 2015 · The challenge-response model is primarily designed to help prevent against replay attacks, in which an attacker sniffs an authentication packet and then replays it within their own …

  7. Frequent 'sqrl' Questions - Information Security Stack Exchange

    Secure Quick Reliable Login (SQRL) - Questions about the security properties of the the SQRL authentication scheme and its implementation.

  8. Questions tagged [sqrl] - Information Security Stack Exchange

    Aug 22, 2019 · SQRL - Secure, Quick, Reliable Login - is an open draft for user authentication. Have there been "enough" publicly available tests to make any backed statements about the security of …

  9. FIDO and FIDO2 differences - Information Security Stack Exchange

    I've been reading both FIDO and FIDO2 specs for a while tring to understand the similarities and differences between both. Here is how I broke it down so far: FIDO: First iteration in creating a cr...

  10. Can a QR code steal my mobile's data?

    Aug 19, 2015 · For example https://web.wechat.com By scanning the QR code from my mobile, it automatically logs in with my wechat account. Here, can QR web sever or QR devices steal the …