A researcher developed an exploit that hijacks passkey authentication. The exploit depends on a non-trivial combination of pre-existing conditions. Neither the passkeys nor the protocol was proven to ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results
Feedback