The first way this can happen is by the user agent. Just like other user-agent state, the thrusted device list can be synchronized across devices.
Aside from this, one may wonder if an origin can sync the thrusted devices it has access to. The security model around this needs to be explored further.
The first way this can happen is by the user agent. Just like other user-agent state, the thrusted device list can be synchronized across devices.
Aside from this, one may wonder if an origin can sync the thrusted devices it has access to. The security model around this needs to be explored further.