Explore tweets tagged as #webAuthn
@RaphaStacks
Raficoshi
47 minutes
I've been wanting to experiment with direct webauthn auth instead of relying on third-party providers They complicate things even perhaps limit things paradoxically I like simple setups composable setups customizable and light setups Hearing that Clarity 5 might be coming
1
0
2
@DinhtienSol
DinhTien | 🎒
17 hours
GM GMT+7 Is passwordless finally ready for crypto ops? Major firms are pushing passkey standards and @beyond__tech keeps highlighting the shift to simpler, safer auth. I wired device‑bound passkeys (WebAuthn) into my route approvals and the change was immediate: fewer reset
19
0
30
@HaadiMMV
Haadi
1 month
Just finished my submission for the @LazorKit bounty hosted by @SuperteamVN. The goal: Gasless interactions on Solana using Passkeys. The problem: WebAuthn signatures (High-S) fail on Solana's secp256r1 precompile half the time. Spent the night writing a byte-level normalizer
37
23
59
@miyahancom
Miyahan
3 months
え、楽天がWebAuthnだと…!? 回数無制限試行可能なOTPを実装して失笑を買うあの楽天が? 天変地異でも起きるのか????
1
105
867
@serge369x33
Serge.XLM
2 months
Just building and learning one piece at a time. The passkey-secured smart wallet is working on testnet now with two contracts talking to each other: one for WebAuthn passkey verification, and one for the shared vault with per-user balances, deposits and payments. Grateful for
1
1
7
@0xbfho
bfho
10 hours
boh starred agektmr/webauthn-devtools on Github
0
0
0
@RaphaStacks
Raficoshi
25 days
Turnkey offers 25 free signatures per month, then charges $0.10 each. Testing alone consumed 55. I did my homework on wallet security. WebAuthn appeared solid: device-bound keys, secure enclave signing, no seed phrases, phishing resistance. I then reviewed the risk model.
1
2
10
@CSSWeekly
CSS Weekly
4 hours
Using `autocomplete="username webauthn”` can be enough to trigger the browser’s Conditional UI — focusing this input field opens a dialog that suggests stored passkeys alongside saved passwords.
0
0
3
@the_yellow_fall
Gray Hats
2 months
ChromeAlone is a stealthy browser implant providing EDR-resistant persistence, SOCKS proxying, session/credential theft, and WebAuthn phishing for security tokens. https://t.co/EfAWxtyeoh
0
3
5
@AndlerDev
Roberto Lucas
9 days
One of my personal 2025 milestones: weeks ago I finished the architecture design, @BuildOnStellar that I built as CTO and tech lead: Smart Wallets + Passkeys (WebAuthn) + native KYC 🔐 The user (or a hardware key) is the key—not a seed phrase.
1
0
4
@Akhil3921793144
Akhil🧙‍♂️,🧙‍♂️ 🧙‍♂️,🛠️ |
2 months
Veera's actual technical moat nobody's talking about: the browser is built on Chromium (fast, stable) the wallet uses WebAuthn (passkey standard) the swap engine uses Router's OGA (optimal routing) the discovery is curated with on-chain verification (security) individually?
60
1
46
@hoops_finance
hoops.fi
3 months
Myth: “Security means friction.” Fact: WebAuthn + ZK auth make it instant and safer.
1
1
4
@oktadev
Okta Dev
1 month
Security is changing Okta’s Secure Sign-in Trends Report 2025 shows workforce MFA adoption at 70%, with phishing-resistant, passwordless auth up 63% YoY Stronger security doesn’t mean more friction. FastPass & WebAuthn are safer, easier to use 🔗Report: https://t.co/uJFHKbxleX
0
1
2
@alexanderchopan
accountless.eth
18 days
“This method retrieves an existing passkey (optionally by credential ID), performs two WebAuthn signatures over the same challenge, reconstructs the public key via ECDSA recovery by intersecting candidate points from both signatures, and returns the hex-encoded PassSeed string.”
0
0
2
@ChromiumDev
Chrome for Developers
2 months
Streamline your sign-in flow for both passkey and password users → https://t.co/EliXEgQFsf Learn how to use form autofill and WebAuthn's conditional UI to create a single, unified sign-in experience that simplifies the transition to passwordless authentication. #PasskeysWeek
1
4
28
@agektmr
Eiji Kitamura / えーじ
3 days
I made a Chrome Extension that allows you to debug #passkeys called WebAuthn DevTools. https://t.co/Nx3U9rG5Ec
0
3
10
@NicoKrauseX
Nico Krause
1 day
Local-First & P2P web apps with WebAuthN hardware secured signing the @orbit_db oplog, #DIDs and also #UCAN's via #WebAuthN varsic envelops! Why all of this is necessary and relates with @storachanetwork ? https://t.co/8K0yt1SmcC
0
1
3
@agektmr
Eiji Kitamura / えーじ
3 days
WebAuthn DevToolsという #パスキー のデバッグをするためのChrome Extensionを作りました。 https://t.co/UFkRTOrKPP
0
11
51
@Kimaru53278222
Tanaka
18 hours
@noritaka_okabe マイナンバーを直接使うのではなく、 マイナンバーを使って 「国家署名付き本人証明」を一度だけ発行する。 以降はWebAuthn+XPRノードで検証する。
1
1
2