Untrusted platform
Frequently, users utilize platforms other than the application on their trusted devices. These unknown platforms are not deemed trustworthy, which can pose security risks. Therefore, it is crucial for users to use their trusted devices to approve or reject any operations that may be susceptible to fraud. This added layer of security ensures that sensitive activities are verified by a reliable source, protecting users from potential fraudulent activities.
Flow example
The following example shows the most simple flow for creating and deciding an operation using different platforms. To give some references, the Trusted Platform can be a Mobile banking application and the Untrusted platform can that same bank's website. The operation is a money transaction.
The flow starts on the Untrusted platform.