L5:

Materials

Raw slides (pdf) about authentication, and the annotated version from lecture.

  • How U2F prevents phishing/mitm attacks.
  • How U2F prevents tracking.
  • Network authentication issues.
  • Solutions:
    • NS, Oauth
  • After authentication, how does authorization work?