[Openid-specs-fapi] Cross-Browser Payment Initiation Attack

n-sakimura n-sakimura at nri.co.jp
Mon Jan 7 21:24:54 UTC 2019


Thanks Torsten and Daniel,

This seems to be a very good starting point for a white paper/technical report. Is there any objection to starting a work based on this?

If so, please speak up by the end of this week.

Best,

Nat Sakimura
Chair, FAPI WG.

Outlook for iOS<https://aka.ms/o0ukef> を入手

________________________________
差出人: Openid-specs-fapi <openid-specs-fapi-bounces at lists.openid.net> (Torsten Lodderstedt via Openid-specs-fapi <openid-specs-fapi at lists.openid.net> の代理)
送信日時: 火曜日, 1月 8, 2019 1:33 午前
宛先: openid-specs-fapi at lists.openid.net
Cc: Torsten Lodderstedt
件名: [Openid-specs-fapi] Cross-Browser Payment Initiation Attack

Hi all,

Daniel and I wrote a document describing a potential kind of attack on redirect based flows used to authorize and initiate payments.

We would like to contribute this document to the working group.

kind regards,
Torsten.

_______________________________________________
Openid-specs-fapi mailing list
Openid-specs-fapi at lists.openid.net
http://lists.openid.net/mailman/listinfo/openid-specs-fapi
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-fapi/attachments/20190107/39b0805d/attachment.html>


More information about the Openid-specs-fapi mailing list