On 9/6/2011 2:23 PM, Michael Thomas wrote:
...
How, exactly, is the user supposed to protect themselves against rogue apps?
 ...

There are a number of ways: 1) Buy shrink-wrapped software only, 2) Inspect the source code of every application, etc... The mobile network providers solve this problem by allowing ONLY applications signed with a special key to run.

Is oauth only intended to be used on standalone trustable web browsers? I don't recall
seeing that anywhere.

When it comes to browsers, yes the user is supposed to trust them. But OAuth is expected to work with the native applications, too (you may find several interesting threads in the archive on that). In both cases, ensuring that the application is not evil is a basic administrative problem. It is not an OAuth problem for two reasons: 1) Whatever would make OAuth fail here will make any other protocol fail; 2) Neither OAuth nor any other protocol can deal with key logging.

Igor
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to