I don’t want to sound rude, but if what’s on try.id.ai is how Internet Identity will work in production, then Dfinity just introduced a massive security risk.
I created a new identity named “jhon” and used a YubiKey to register. All of this was done in private/incognito mode on my iPhone. After creating the identity, I closed the tab — meaning all local storage was cleared.
Later, I went back to the site, clicked:
• “Try the new sign-in experience”
• “Continue with passkey”
• “Use existing passkey”
• Selected “security key”
I plugged in the same YubiKey and… that’s it. I was in. No anchor ID, no additional step, nothing. Just physical access to the key granted full access to everything: my identity, my potential net worth, private data, etc.
Let’s consider a very realistic scenario: someone loses their YubiKey, and now that II is going mainstream, the attacker just plugs it in and gets full access. No need to know the anchor number or any context. That anchor prompt in v1 was actually a very important barrier — even if technically unnecessary, it served a critical security function in the real world.
Right now, this feels less secure than a regular email login, because at least with email/password, the attacker needs to know something. With this, possession = total access.
Before, the YubiKey was like a key that could open a safe — but only if you knew where the safe was (the anchor ID). Now, it’s like the key not only opens the safe, but also magically finds it for you, no matter where it is. Just plug it in, and boom — full access.
@bjoernek @bjoern @Jan @dominicwilliams guys you are aware of this?