| ▲ | tadfisher 3 hours ago | |||||||
Correction: nothing prevents the attacker from using the app's legit package ID other than requiring the uninstall of the existing app. The spoofed app can't request passkeys for the legit app because the legit app's domain is associated with the legit app's signing key fingerprint via .well-known/assetlinks.json, and the CredentialManager service checks that association. | ||||||||
| ▲ | mwwaters 2 hours ago | parent | next [-] | |||||||
If the side loaded app does not have permission to use the passkeys and cannot somehow get the user to approve passkey access of the new app, that would be a good alternative to still allow custom apps. | ||||||||
| ||||||||
| ▲ | 3 hours ago | parent | prev [-] | |||||||
| [deleted] | ||||||||