Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> But much of the recommendations say to use the counter as a heuristic rather than evidence of a cloned authenticator because there are many legitimate reasons the counter can be wrong.

I'm curious on why there would be any legitimate reason for that. Security wise it should not happen, it's just some implementations being crappy or some bad practice like reusing same passkey with different devices ?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: