TrustPin is built on proven security research and addresses the fundamental challenges identified in OWASP’s Certificate and Public Key Pinning guidelines.
Our solution addresses the critical challenges identified by Mark Gamache and Kevin Wall in their foundational OWASP research on Certificate and Public Key Pinning.
Authors: Mark Gamache and Kevin Wall
This foundational research identified critical vulnerabilities in traditional PKI models and established the security principles that guide modern certificate pinning implementations.
Traditional PKI assumes trust in numerous Certificate Authorities, creating attack vectors through 'trickery and bribery' of CAs.
Standard certificate validation insufficient in environments where network infrastructure may be compromised.
Multiple trusted CAs create opportunities for attackers to obtain rogue certificates through various means.
The OWASP research identified critical implementation challenges. TrustPin provides modern solutions to each of these problems.
Keeping client-side pinsets and server keys synchronized in real-time is extremely difficult
Automated signed configuration delivery via CDN ensures instant global synchronization
Certificate rotation becomes extremely complex and requires precise coordination
Zero-downtime certificate updates without app store releases or forced updates
HTTP Public Key Pinning (HPKP) failed due to Trust on First Use security weakness
Cryptographically signed configurations eliminate trust on first use vulnerabilities
Incompatibility with corporate TLS inspection environments
Configurable validation modes support corporate and development environments
TrustPin implements the best practices recommended in the OWASP research, while adding modern improvements for operational efficiency.
TrustPin delivers pinsets through signed configurations, separate from main communication channels
Uses JSON Web Signature (JWS) for secure, verifiable configuration delivery as recommended by OWASP
Optimized for mobile applications where pinning provides maximum security benefit with minimal operational risk
OWASP Research Conclusion:
"Considering the current risks in the CA and browser space and comparing them to the risk of downtime, pinning is not recommended."
TrustPin’s Innovation:
We eliminated the 'risk of downtime' by solving certificate rotation without app updates, making pinning not just viable, but essential for modern security.
Remote certificate updates eliminate downtime concerns
All the protection of pinning without the operational burden
Experience the security benefits of certificate pinning without the operational complexity