Simulator
Simulation of the authentication schema beetween 2 ids
- 100% portability in the browser
- compatible passkey, hardware key (for example yubikey)
- No third parties are used to relay messages or to identify Bob and Alice beforehand
- Encrypted exchanges with a shared symmetric key
Which way do you want to secure Bob Id?
Which way do you want to secure Bob Id?
Encrypted
Decrypted