Chrome 70 supports the Touch ID of MacBook Pro for website authentication

From Malcolm Owen
Friday, September 14, 2018, 06:51 pm PT (9:51 am ET)

MacBook Pro users will soon be able to use Touch ID to authenticate with websites in Chrome, with version 70 of the Google web browser supporting fingerprint readers in macOS, alongside other features.

In a blog post about features that come in as part of Chrome 70, the Chromium Blog marks a number of changes that arrive in the browser. Chrome 70 was introduced in beta on Thursday and is expected to be released mid-October.

As part of two updates to the Web Authentication API, relating to the use of the "PublicKeyCredential", Chrome 70 will provide the ability to use Touch ID as biometric authentication for websites. An image that shows a sample prompt that allows users to verify their identity lists the use of a & # 39; Touch Sensor & # 39 ;, as well as options for canceling authentication or & # 39; Using screen lock & # 39 ;.

The other web authentication API update adds PublicKeyCredential as a third reference type, in addition to PasswordCredential and FederatedCredential, which supports biometric authentication and other methods by PublicKeyCredential. This is also enabled by default on macOS.

A trial of "Shape Detection Origin" will make it possible to use the form detection capabilities of a device on websites, using three APIs for face recognition, barcode detection and text detection. The function allows the browser to use the existing functions of a device to analyze or record these three types of data from the browser, with the post indicating the use of local resources avoiding the use of a "performance-killing library" .

Chrome 70 will also automatically exit a full screen mode when a page displays a dialog box, with the forced switch back to a window mode that is said to take users out of the more immersive mode when a decision needs to be made.

TLS 1.3, an updated version of the TLS protocol to encrypt communication between computers, will be included, with a "simpler, less error-prone design" with claimed improvements in efficiency and security. The new version reduces the number of "round trips" needed to establish an encrypted connection, removes unsafe legacy options, encrypts more of the handshake element, and rescues the resume mode against key-based compromises.