16
Chromium developing device bound session tokens to combat session token theft techniques
(blog.chromium.org)
A community for discussion about cybersecurity, hacking, cybersecurity news, exploits, bounties etc.
Rules :
Icon base by Delapouite under CC BY 3.0 with modifications to add a gradient
The article specifically talks about malware running on the host machine. If that is happening, how is a TPM supposed to help?
Great, the browser generates a key pair and puts the private key in the TPM. So the malware sits between the browser and the TPM. How is that better? Even if the private key were generated on the TPM, what stops malware from impersonating chrome or hooking into chrome?
I can't help but think it's security theatre to add another tracking mechanism behind the scenes.
Anti Commercial-AI license