I'd like to propose a new Web API to enable a more user-friendly and secure method for phone number verification: the Web Flash Call API.
The current standard for web-based phone number verification relies on SMS One-Time Passwords (OTPs). This method introduces significant user friction. Users must:
A superior alternative, flash call authentication, exists in the native app ecosystem. It works by placing an automated, single-ring call to a user's phone, with the caller ID containing a unique verification code. The native app then reads this code from the device's call logs to verify the user without any manual input. This is not possible on the web platform due to critical security sandboxing.
I propose a new, dedicated Web API that enables this functionality without compromising user security. The API would not grant a website direct access to a user's call logs. Instead, it would act as a secure, browser-managed "picker," similar to the Web Share or File System Access APIs.
The API would work as follows:
navigator.telephony.flashCall()
, passing the user's phone number.This approach provides a seamless user experience while strictly adhering to Chromium's privacy and security principles.
This proposal is designed to directly address the security concerns of accessing sensitive data.
This solution offers a pragmatic way to bring a critical native app feature to the web, improving the user experience for web-based applications that require phone number verification, such as web-based phone apps.
I look forward to your feedback and discussion.
Best regards,
Kebba
--
--
Chromium Developers mailing list: chromi...@chromium.org
View archives, change email options, or unsubscribe:
http://groups.google.com/a/chromium.org/group/chromium-dev
---
You received this message because you are subscribed to the Google Groups "Chromium-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to chromium-dev...@chromium.org.
To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/chromium-dev/CAJPYs8kOq3CaezFq3tUqLiH3DSS1_CwwbHncj4okwUx%3D1K8jQg%40mail.gmail.com.
Not Clear to me either please explain how to used it.
I hope so too!
That's an interesting point. While both calls and SMS messages can be redirected in a SIM swap attack, the security benefit of using flash calls for authentication isn't about preventing the redirection itself. The advantage lies in the fact that it's a zero-trust method.Think about it this way: a flash call authentication doesn't rely on the user to receive and enter a code. Instead, it works by the system programmatically verifying the call from a pre-determined number, without the user ever picking up the phone. This removes the "human-in-the-loop" step, which is where many phishing and social engineering attacks succeed. It makes it much harder for an attacker who has hijacked a SIM to also trick the user into revealing a one-time password (OTP) or to bypass the security measure in real-time.Regarding the billing, you're right to question it. The service we've partnered with operates on a clear, pre-negotiated agreement. It's not about exploiting a loophole, but rather about leveraging an established service within the telecommunications network that provides a more secure and efficient authentication method. We have a direct partnership with the provider, and the terms of that agreement are in place. This ensures the service is reliable and sustainable, rather than being dependent on an temporary billing oversight.