Aller au contenu principal

Simulator

Simulation of the authentication schema beetween 2 ids

  • 100% portability in the browser
  • compatible passkey, hardware key (for example yubikey)
  • No third parties are used to relay messages or to identify Bob and Alice beforehand
  • Encrypted exchanges with a shared symmetric key
Which way do you want to secure Bob Id?
Which way do you want to secure Bob Id?
Encrypted
Decrypted