Could a device’s identification be used as 1st factor of identification in 2FA mechanism?
For a new website, with JavaScript we check if there is a private ECDSA key found in the IndexedDB. If not, the device generate ECDSA P-256 keys pair, save his private key (not extractable, WebCrypto API) and send his public … Continue reading Could a device’s identification be used as 1st factor of identification in 2FA mechanism?