Conversation

Replying to
what i'm saying is that as a browser vendor -and- website maintainer, adopting webauthn makes authentication flow both more secure and less annoying, so these parties should adopt it
1
4
Attestation doesn't imply a security model based on chaining to known intermediate or root certificates. It's not a strong form of verification and as you mention it can be used to implement user hostile features. That's not true of attestation in general though, just that kind.
1
1
If there's no known intermediate / root, it doesn't work as a foundation for DRM, and it still works perfectly for pairing-based attestation aimed at helping the device owner perform a hardware verified check, whether it's a personal device or an organization with many deployed.
1