CKey
A Chrome Extension that emulates a Hardware Authentication Device
Qu'est-ce que CKey ?
CKey est une extension Chrome développée par chomekeyextension, et sa fonction principale est "A Chrome Extension that emulates a Hardware Authentication Device".
Captures d'Écran de l'Extension
Télécharger le fichier CRX de l'extension CKey
Téléchargez les fichiers d'extension CKey au format crx, installez manuellement les extensions Chrome dans le navigateur ou partagez les fichiers crx avec des amis pour installer facilement les extensions Chrome.
Instructions d'Utilisation de l'Extension
Chrome Key emulates a Hardware Authentication Device. It is capable of answering Webauthn requests for both registering new keys and authenticating with existing ones. The purpose is to allow developers to test their applications without requiring having an actual device in hand. It relies on browser standards such as Web Cryptography API and Concise Binary Object Representation for generation and interaction with key material. This will never be able to provide the same security guarantees as a real HAD, so use it for development, debugging and testing only. A 3-post blog series was written, touching different portions of this extension, its guarantees and lack of. The first post of the series may be found here https://blog.joaopeixoto.net/chrome-key-an-extension-story/.
Informations de Base sur l'Extension
Nom | CKey |
ID | fjdlagkdaoginbnmlhcpochmeecjgcah |
URL Officiel | https://chromewebstore.google.com/detail/ckey/fjdlagkdaoginbnmlhcpochmeecjgcah |
Description | A Chrome Extension that emulates a Hardware Authentication Device |
Taille du Fichier | 163 KB |
Nombre d'Installations | 47 |
Version Actuelle | 1.0.2 |
Dernière Mise à Jour | 2020-01-26 |
Date de Publication | 2020-01-26 |
Développeur | chomekeyextension |
Type de Paiement | free |
Langues Prises en Charge | en-US |
manifest.json | |
{ "update_url": "https:\/\/clients2.google.com\/service\/update2\/crx", "manifest_version": 2, "name": "CKey", "description": "A Chrome Extension that emulates a Hardware Authentication Device", "version": "1.0.2", "minimum_chrome_version": "36.0.1985.18", "content_scripts": [ { "all_frames": true, "matches": [ "https:\/\/*\/*" ], "exclude_matches": [ "https:\/\/*\/*.xml" ], "run_at": "document_start", "js": [ "js\/content_script.js" ] } ], "background": { "persistent": false, "scripts": [ "js\/babel_polyfill.js", "js\/background.js" ] }, "content_security_policy": "script-src 'self' 'unsafe-eval'; object-src 'self'", "page_action": { "default_icon": { "16": "images\/lock-16.png", "32": "images\/lock-32.png", "48": "images\/lock-48.png", "128": "images\/lock-128.png" } }, "icons": { "16": "images\/lock-16.png", "32": "images\/lock-32.png", "48": "images\/lock-48.png", "128": "images\/lock-128.png" }, "permissions": [ "tabs", "storage", "https:\/\/*\/*", "http:\/\/*\/*" ], "web_accessible_resources": [ "js\/inject_webauthn.js", "img\/*" ] } |