L5:
Materials
Raw slides (pdf) about authentication, and the annotated version from lecture.
- How U2F prevents phishing/mitm attacks.
- How U2F prevents tracking.
- Network authentication issues.
- Solutions:
- NS, Oauth
- After authentication, how does authorization work?