A Case Study on Exploiting Origin Binding Failures via Remote Browser Orchestration (RBO) and Dynamic BiTB
The "Trust Service Provider" Paradox
We disclosed these findings to SK ID Solutions via their designated secure channels. The experience was a masterclass in irony. For a multinational Identity Provider and "Qualified Trust Service Provider," their own security hygiene was functionally non-existent.
At the time of the report, the Incident Response Team had allowed their public PGP keys to expire, effectively decapitating their own encrypted reporting channel. For 55 days, their triage process remained incapacitated. It is a bold move for a PKI-based company to manage their own keys with less competence than a hobbyist, yet here we are.
This repository contains research on Smart-ID security vulnerabilities, architectural flaws, and strategic analysis. The content has been organized into thematic categories.
.
βββ 01-core-analysis/ # Main security analysis and research
β βββ smartid-security-research.md
βββ 02-opinion-editorials/ # Opinion pieces and editorial content
β βββ 01-arnis-parsovs-analysis.md
β βββ 02-tom-kristian-abel-op-ed.md
β βββ 03-convenience-vs-security-analysis.md
βββ 03-technical-analysis/ # Detailed technical assessments
β βββ 01-suggested-security-measures.md
βββ 04-supplementary-research/ # Supporting research and alternatives
β βββ 01-public-awareness-fraud-mitigation.md
β βββ 02-fido2-pivot-analysis.md
β βββ 03-strategic-guide.md
βββ 05-drafts/ # Work-in-progress content
β βββ ideas.md
βββ 06-archived/ # Deprecated/merged content
β βββ README.md
βββ README.md # This file
Main Security Research
- smartid-security-research.md - Analysis of Smart-ID+ vulnerabilities, architectural flaws, phishing attack vectors (QRLJacking), and the "OutSmart-ID" offensive framework. Includes technical gap analysis against modern standards (FIDO2, NIST SP 800-63-4, eIDAS 2.0).
Opinion Pieces & Editorial Content
-
01-arnis-parsovs-analysis.md - Analysis of Arnis ParΕ‘ovs' critique of Smart-ID, including his arguments about banks prioritizing convenience over security, the regression from password cards, and the conflict of interest in bank ownership of SK ID Solutions.
-
02-tom-kristian-abel-op-ed.md - The main op-ed piece (Estonian: "ARVAMUS: E-riigi lahtine tagauks") arguing that Smart-ID vulnerabilities are conscious design choices by SK ID Solutions, not bugs. Includes the "smoking gun" email evidence and CVE dispute analysis.
-
03-convenience-vs-security-analysis.md - Detailed UX analysis showing how Smart-ID+ prioritizes convenience over security, including push notification architecture, absence of manual VC entry, and legacy compatibility issues.
Technical Assessments
- 01-suggested-security-measures.md - Practical security measures for Relying Parties (RPs) to implement, including anonymous flows, trusted browser tracking, IP reputation monitoring, and user verification mechanisms.
Supporting Research & Alternatives
-
01-public-awareness-fraud-mitigation.md - Research on the effectiveness of public awareness campaigns (2014-2025), including quantitative impact data, behavioral change studies, and global best practices from Singapore, UK, and Australia.
-
02-fido2-pivot-analysis.md - Technical feasibility study of pivoting from Smart-ID's proprietary split-key architecture to FIDO2/WebAuthn with Cloud Signature Consortium (CSC) for achieving QES and LoA High compliance.
-
03-strategic-guide.md - Strategic plan for opinion editorial creation, including headline ideas, structural outline, and argumentation strategy for differentiating from Arnis ParΕ‘ovs' critique.
Work-in-Progress Content
- ideas.md - Draft concepts including "Turvateater" (Security Theater) critique and analysis of proprietary lock-in strategies.
Original Files (Merged)
Contains the original files that were merged into the new structure. See 06-archived/README.md for the complete mapping of original files to their new locations.
Smart-ID+ relies on visual verification (Control Codes) rather than cryptographic origin binding. This creates a fundamental gap where:
- The system validates that someone scanned the code
- But cannot verify that the requesting browser is the legitimate one
- Attackers can relay legitimate QR codes and Control Codes in real-time
True phishing resistance requires: Is it safe for the user to approve an authentication request without thinking?
- β FIDO2/WebAuthn: Yes - Protocol enforces origin binding
- β Client-Side TLS (ID-Card): Yes - Handshake enforces origin binding
- β Smart-ID+ (Cross-Device): No - Lacks cryptographic binding
A containerized, virtualization-based phishing framework using:
- Frontend (BiTB): High-fidelity CSS/JS shell mimicking OS/browser
- Backend (Dockerized Chromium): Headless browsers in isolated containers
- Transport (noVNC/WebSockets): Live streaming of genuine sites
- Reverse Proxy: Custom Golang proxy for session cookie extraction
"The vulnerability was known to us... we have consciously accepted this risk."
An Accepted Risk without a Compensating Control is just a vulnerability with a marketing budget.
- Mandate cryptographic origin binding - Move beyond visual verification
- Enforce FIDO2/WebAuthn adoption for high-assurance authentication
- Establish liability frameworks - Shift risk from users to service providers
- Regulate social media advertising - Prevent fraudster impersonation
- Implement FIDO2/Passkeys as primary authentication method
- Use Smart-ID strictly for QES signatures where legally mandated
- Deploy risk-based authentication with behavioral analytics
- Provide user education with just-in-time interventions
- Acknowledge architectural debt - Stop disputing CVE classifications
- Pivot to FIDO2/WebAuthn - Modernize the authentication stack
- Implement proper origin binding - Cryptographic, not visual
- Improve transparency - Open security architecture for audit
This research employs:
- Offensive Security Testing - Building actual attack frameworks (OutSmart-ID)
- Comparative Analysis - Against FIDO2, NIST, eIDAS standards
- Behavioral Science - COM-B model for user behavior analysis
- Strategic Analysis - Monopoly dynamics and incentive structures
- Historical Research - 2014-2025 fraud mitigation campaign data
- NIST SP 800-63-4 - Digital Identity Guidelines
- FIDO Alliance - Phishing-Resistant Authentication Standards
- eIDAS 2.0 / EUDI Wallet ARF - EU Digital Identity Architecture
- Cloud Signature Consortium (CSC) - Remote Signing Standards
- CEN/TS 419 241 - Remote Qualified Signature Creation
- KnowBe4 Phishing Industry Benchmarking Report (2024)
- ACCC National Anti-Scam Centre Reports (2024-2025)
- UK Finance Fraud Updates (2025)
- Singapore IMDA ScamShield Data (2022-2024)
- US Postal Inspection Service Studies (2024)
- ENISA European Cybersecurity Month Reports (2025)
- SK ID Solutions correspondence (December 5, 2025)
- CVE database entries (DISPUTED status analysis)
- Public disclosure records
- Start with
01-core-analysis/smartid-security-research.mdfor comprehensive overview - Review
04-supplementary-research/02-fido2-pivot-analysis.mdfor modern alternatives - Use
03-technical-analysis/01-suggested-security-measures.mdfor implementation guidance
- Begin with
02-opinion-editorials/02-tom-kristian-abel-op-ed.mdfor strategic narrative - Review
04-supplementary-research/01-public-awareness-fraud-mitigation.mdfor campaign effectiveness - Use
04-supplementary-research/03-strategic-guide.mdfor argumentation strategy
- Focus on
03-technical-analysis/01-suggested-security-measures.mdfor RP implementation - Study
01-core-analysis/smartid-security-research.mdfor attack vectors - Reference
04-supplementary-research/02-fido2-pivot-analysis.mdfor migration path
This research is provided for educational and research purposes only. The techniques described should only be used in authorized security testing environments with explicit permission from system owners.
The author and contributors assume no liability for any misuse of this information. All findings have been disclosed to relevant parties through responsible disclosure channels.
Copyright 2026. Educational purposes only.
This is a research repository. Contributions are welcome in the form of:
- Additional research findings
- Technical analysis improvements
- Translation and localization
- Strategic recommendations
Please submit pull requests or issues for review.
For questions about this research or the reorganization of this repository, please refer to the commit history and file mappings in 06-archived/README.md.
Written by Tom Kristian Abel, Security Researcher
The King is Naked.