Explore tweets tagged as #webAuthn
I've been wanting to experiment with direct webauthn auth instead of relying on third-party providers They complicate things even perhaps limit things paradoxically I like simple setups composable setups customizable and light setups Hearing that Clarity 5 might be coming
1
0
2
GM GMT+7 Is passwordless finally ready for crypto ops? Major firms are pushing passkey standards and @beyond__tech keeps highlighting the shift to simpler, safer auth. I wired device‑bound passkeys (WebAuthn) into my route approvals and the change was immediate: fewer reset
19
0
30
Just finished my submission for the @LazorKit bounty hosted by @SuperteamVN. The goal: Gasless interactions on Solana using Passkeys. The problem: WebAuthn signatures (High-S) fail on Solana's secp256r1 precompile half the time. Spent the night writing a byte-level normalizer
37
23
59
え、楽天がWebAuthnだと…!? 回数無制限試行可能なOTPを実装して失笑を買うあの楽天が? 天変地異でも起きるのか????
1
105
867
Just building and learning one piece at a time. The passkey-secured smart wallet is working on testnet now with two contracts talking to each other: one for WebAuthn passkey verification, and one for the shared vault with per-user balances, deposits and payments. Grateful for
1
1
7
Turnkey offers 25 free signatures per month, then charges $0.10 each. Testing alone consumed 55. I did my homework on wallet security. WebAuthn appeared solid: device-bound keys, secure enclave signing, no seed phrases, phishing resistance. I then reviewed the risk model.
1
2
10
Using `autocomplete="username webauthn”` can be enough to trigger the browser’s Conditional UI — focusing this input field opens a dialog that suggests stored passkeys alongside saved passwords.
0
0
3
ChromeAlone is a stealthy browser implant providing EDR-resistant persistence, SOCKS proxying, session/credential theft, and WebAuthn phishing for security tokens. https://t.co/EfAWxtyeoh
0
3
5
One of my personal 2025 milestones: weeks ago I finished the architecture design, @BuildOnStellar that I built as CTO and tech lead: Smart Wallets + Passkeys (WebAuthn) + native KYC 🔐 The user (or a hardware key) is the key—not a seed phrase.
1
0
4
Veera's actual technical moat nobody's talking about: the browser is built on Chromium (fast, stable) the wallet uses WebAuthn (passkey standard) the swap engine uses Router's OGA (optimal routing) the discovery is curated with on-chain verification (security) individually?
60
1
46
Myth: “Security means friction.” Fact: WebAuthn + ZK auth make it instant and safer.
1
1
4
Security is changing Okta’s Secure Sign-in Trends Report 2025 shows workforce MFA adoption at 70%, with phishing-resistant, passwordless auth up 63% YoY Stronger security doesn’t mean more friction. FastPass & WebAuthn are safer, easier to use 🔗Report: https://t.co/uJFHKbxleX
0
1
2
“This method retrieves an existing passkey (optionally by credential ID), performs two WebAuthn signatures over the same challenge, reconstructs the public key via ECDSA recovery by intersecting candidate points from both signatures, and returns the hex-encoded PassSeed string.”
0
0
2
Streamline your sign-in flow for both passkey and password users → https://t.co/EliXEgQFsf Learn how to use form autofill and WebAuthn's conditional UI to create a single, unified sign-in experience that simplifies the transition to passwordless authentication. #PasskeysWeek
1
4
28
I made a Chrome Extension that allows you to debug #passkeys called WebAuthn DevTools. https://t.co/Nx3U9rG5Ec
0
3
10
Local-First & P2P web apps with WebAuthN hardware secured signing the @orbit_db oplog, #DIDs and also #UCAN's via #WebAuthN varsic envelops! Why all of this is necessary and relates with @storachanetwork ? https://t.co/8K0yt1SmcC
0
1
3
WebAuthn DevToolsという #パスキー のデバッグをするためのChrome Extensionを作りました。 https://t.co/UFkRTOrKPP
0
11
51
@noritaka_okabe マイナンバーを直接使うのではなく、 マイナンバーを使って 「国家署名付き本人証明」を一度だけ発行する。 以降はWebAuthn+XPRノードで検証する。
1
1
2