Chrome's Device-Bound Sessions Land on Windows, Slashing Cookie Theft Risks
Infostealer malware swiped session cookies from millions of devices last year alone. Chrome's new Device Bound Session Credentials (DBSC) ties them to hardware, rendering theft pointless.
theAIcatchupApr 10, 20263 min read
⚡ Key Takeaways
DBSC uses TPM/Secure Enclave to bind sessions to hardware, killing stolen cookie value.𝕏
Google saw reduced theft on its properties; Chrome's 65% market share amplifies impact.𝕏
Sites add minimal backend endpoints; W3C standard with Microsoft/Okta input ensures adoption.𝕏
The 60-Second TL;DR
DBSC uses TPM/Secure Enclave to bind sessions to hardware, killing stolen cookie value.
Google saw reduced theft on its properties; Chrome's 65% market share amplifies impact.
Sites add minimal backend endpoints; W3C standard with Microsoft/Okta input ensures adoption.