Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Introduction
00:00 • 3min
What Is a Pass Key?
02:59 • 6min
U Two F Security Keys?
08:32 • 2min
Stap Two - Security Keys
10:51 • 4min
Is There a Difference Between a Google Account and a Security Key?
14:51 • 2min
Using a Phone as a Security Key?
16:37 • 4min
Isn't It a P S K Version of Noise?
20:40 • 5min
Ioa 16
26:00 • 3min
How to Get Credentials From a Phone
29:03 • 2min
Using a Phone as a Credential?
30:39 • 2min
The Tunnel Service, Brodical
32:37 • 3min
Can You Build Random Tunnels Between Different Pieces of Software?
35:20 • 3min
Is There an API on Android for Credential Sinkers?
38:29 • 2min
How to Create a Pass Key Locally on a Macbook?
40:38 • 2min
What Happens When You Attest Your Identity With a Pair of Keys?
42:46 • 3min
Is There a Security Key Associating With Example Dot Com?
46:16 • 3min
PassKeys - How Does That Change With Passkeys?
48:52 • 2min
What's the Point of Multifactor Authentication?
51:10 • 2min
Is There a Multifactor Approach to Account Recovery?
52:53 • 5min
I'm a Little Confused, but It's All Pretty Neat Stuff, You Know?
57:59 • 2min
How Did You End Up Working on This?
59:42 • 3min