-
Notifications
You must be signed in to change notification settings - Fork 13
Fido2 vs u2f #468
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Fido2 vs u2f #468
Conversation
✅ Deploy Preview for gracious-clarke-e6b312 ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
jscyo
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've added some formatting changes that need to be done for all the points
| author: "Maurice Saldivar" | ||
| --- | ||
|
|
||
| ## FIDO2 vs U2F: 5 Key Differences Explained |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
remove this, title is already mentioned as the h1 tag
|
|
||
| ## FIDO2 vs U2F: 5 Key Differences Explained | ||
|
|
||
| U2F laid the groundwork for strong, phishing-resistant authentication. FIDO2 builds on it with broader use cases and modern support. Here's how they differ. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this being the first paragraph is confusing, We need to assume that most people reading this article don't know what either of these two standards are
| "location": "https://supertokens.com/blog/cors-errors" | ||
| }, | ||
| { | ||
| <<<<<<< HEAD |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
please resolve this merge conflict correctly
|
|
||
| U2F laid the groundwork for strong, phishing-resistant authentication. FIDO2 builds on it with broader use cases and modern support. Here's how they differ. | ||
|
|
||
| Authentication standards evolve to address real security gaps. U2F (Universal 2nd Factor) emerged in 2014 to combat phishing attacks that traditional multi-factor authentication couldn't prevent. FIDO2 arrived in 2018 as the next generation, expanding beyond second-factor authentication to support passwordless login. Both standards use public-key cryptography and bind credentials to specific domains, making them resistant to phishing, credential stuffing, and man-in-the-middle attacks. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this section needs to be reworked, to flow better, for example
Authentication standards evolve to close real security gaps. U2F (Universal 2nd Factor), introduced in 2014, offered phishing-resistant MFA using public-key cryptography—something passwords and OTPs couldn't provide. In 2018, FIDO2 expanded this model with WebAuthn and CTAP2, enabling both multi-factor and passwordless authentication.
Both standards protect against phishing, credential stuffing, and man-in-the-middle attacks by binding credentials to specific origins. But their capabilities and long-term viability differ significantly.
also mention that this blog goes over 5 key differences to help devs choose between the two
|
|
||
| ## 1. Scope of Use | ||
|
|
||
| U2F operates exclusively as a second factor. Users must first authenticate with a password before U2F verification occurs. The security key proves possession of a registered device but cannot replace the initial authentication step. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| U2F operates exclusively as a second factor. Users must first authenticate with a password before U2F verification occurs. The security key proves possession of a registered device but cannot replace the initial authentication step. | |
| **U2F**: operates exclusively as a second factor. Users must first authenticate with a password before U2F verification occurs. The security key proves possession of a registered device but cannot replace the initial authentication step. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Make similar changes to the rest of the points so it feels better organized
| U2F operates exclusively as a second factor. Users must first authenticate with a password before U2F verification occurs. The security key proves possession of a registered device but cannot replace the initial authentication step. | ||
|
|
||
| FIDO2 supports both multi-factor and passwordless authentication. In multi-factor mode, it functions similarly to U2F. In passwordless mode, the security key becomes the sole authentication method. Users verify their identity through biometrics or a PIN on the authenticator itself, eliminating passwords entirely. | ||
|
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Add a "Why this matters" subheading here
Related Issue
Link to the Github Issue created for this blog post
Link to Google Doc
doc
Checklist
Remaining TODOs