SHARE
Facebook X Pinterest WhatsApp

Forget oAUTH?! Mozilla’s Browser ID

Jul 15, 2011

From the ‘Your Email is Yofirefoxur Password‘ files:

Since the beginning of the Internet era, your email address and your ability to verify that it’s actually yours has been the lynchpin of Internet identity.

You want to join a new site/service? Sure! Just verify your email address…

Mozilla is now making that whole exercise easier with a new effort called BrowserID. Basically what it does is it keeps your verified email in the browser and then compliant BrowserID sites can verify that address when you click on a button.

“BrowserID implements the Verified Email Protocol, which is designed with security in mind. Sites get proof of ownership using public key cryptography—but don’t worry, we have a verification service so you can get started without writing a single line of crypto code,” Mozilla’s demo site for BrowserID states.

Since the ID is technically stores on the local machine, Mozilla is not actually storing anything on their servers, so there is also potentially less risk for information leakage.

The actual code needed to implement BrowserID is trivially simple in my opinion, which could make this system very easy to implement.

Could this be an oAUTH killer?

Likely not…oAUTH is already widely deployed and has demonstrated itself to be massively scalable and highly federated. BrowserID is still an early dev project, but it holds a whole lot of promise. BrowserID isn’t really creating a new ID store, as is the case with oAUTH, BrowserID is just providing us with a new way to use an ID we already have — our email addresses.

Just as oAUTH has potential security risks, there are some considerations for BrowserID too. Jeremiah Grossman, founder of Whitehat Security (and all around good guy) tweeted that :

“One threat model would be forcing somehow forcing un-authed users to login (BrowserID), deanonymizing them, and grabbing their email addy.”

Another would be XSSing the BrowserID domain, steal the auth-cookies, & then attacker may login (as the user) to anything support it. @jeremiahg

As with all web app security issues, users need to be vigilant about the sites they visit and what they actually click. When it comes to XSS, CSRF and Clickjacking, the same protections/mitigations that site owners are already taking (and the same risks) are still in play.

Recommended for you...

Facebook Becomes Meta, But Did It Move Too Soon?
Rob Enderle
Oct 29, 2021
Microsoft Gets Rid Of Passwords: I Can Almost Hear Angels Singing
Rob Enderle
Sep 17, 2021
Why AMD Has Been So Successful: Mark Papermaster
Rob Enderle
Sep 9, 2021
Another Crazy Week in Cybersecurity
Paul Shread
Jul 2, 2021
Internet News Logo

InternetNews is a source of industry news and intelligence for IT professionals from all branches of the technology world. InternetNews focuses on helping professionals grow their knowledge base and authority in their field with the top news and trends in Software, IT Management, Networking & Communications, and Small Business.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.