Passkeys are built on the FIDO2 standard (CTAP2 + WebAuthn standards). They remove the shared secret, stop phishing at the source, and make credential-stuffing useless.

But adoption is still low, and interoperability between Apple, Google, and Microsoft isn’t seamless.

I broke down how passkeys work, their strengths, and what’s still missing

  • Brokkr@lemmy.world
    link
    fedilink
    English
    arrow-up
    11
    ·
    10 days ago

    While the lock-in issue is annoying and a good reason not to adopt these, the device failure issue is a tech killer. Especially when I can use a password manager. This means I can remember two passwords (email and password manager), make them secure, and then always recover all my accounts.

    Passkeys are a technology that were surpassed 10 years before their introduction and I believe the only reason they are being pushed is because security people think they are cool and tech companies would be delighted to lock you into their system.

    • hansolo@lemmy.today
      link
      fedilink
      English
      arrow-up
      6
      ·
      10 days ago

      This is the only accurate take in the whole thread.

      Passkeys solve “well, can’t be fished” by introducing 2 new problems and never resolving super prevalent session hijacking. Even as a basic cost-benefit analysis, it’s a net loss to literally everyone.

      • anomnom@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        1
        ·
        9 days ago

        That’s what I worried, and then especially to computers that age out of updates (2 older MacBooks).

        We end up having to reauthenticate on some other device at some point anyway and that means there’s still going to be a weak point.

        Like with 2 auth sim jacking.

    • LuigiMaoFrance@lemmy.ml
      link
      fedilink
      English
      arrow-up
      4
      ·
      10 days ago

      Cops also love them because they make getting access to your entire phone including all accounts simple as cake if you use fingerprint/faceID to unlock your device.

    • smiletolerantly@awful.systems
      link
      fedilink
      English
      arrow-up
      1
      ·
      10 days ago

      You can store Passkeys in open source password managers.

      I don’t know most of my passwords, so the step to passkeys doesn’t feel like a big one. I also really like the flow of pressing Login; Bitwarden pops up a prompt without me initiating it; I press confirm. Done, logged in, and arguably more secure due to the surrounding phishing and shared secrets benefits.

      • Brokkr@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        10 days ago

        Sure, they probably work great when you have your *passkey manager on the device, but that’s not when I need to have backup routes into my accounts. When using a new device, or someone else’s, having even a complicated password that can be typed or copied-pasted has way more functionality.

        As far a I can tell, using passkeys would only risk locking me out of my accounts. Everyone else is already effectively locked out.

            • lmmarsano@lemmynsfw.com
              link
              fedilink
              English
              arrow-up
              0
              arrow-down
              1
              ·
              9 days ago

              Isn’t that the same thing? All my credentials & passkeys are in the cross-platform password manager available from all my devices & any web browser. Passkeys even have a cross-device flow, so we can just scan a QR code & use a phone to sign into anything.

              Manually keying in a password just feels so boomer.

        • Vittelius@feddit.org
          link
          fedilink
          English
          arrow-up
          0
          ·
          8 days ago

          You could also use dedicated hardware to store your keys. Any FIDO USB key will do. I have a Yubikey that cost me less than 30 bucks.

          It’s really handy, because I frequently use someone else’s device for work. All I have to do is plug it in, press the button on the key and enter the master password for the passkey storage. It’s like having a password manager on a USB stick.

      • Septimaeus@infosec.pub
        link
        fedilink
        English
        arrow-up
        0
        ·
        9 days ago

        Yeah the moods in this thread, like

        “[I don’t understand this]!”

        “[I don’t trust this]!”

        “[It doesn’t fix everything]!”

        “[This doesn’t benefit me]!”

        “[What’s wrong with old way]!?”

        And like, all valid feelings… just the reactions are a bit… intense? Especially considering it’s a beta stage auth option that amounts to a fancy version of the old sec key industry standard, not the mark of the beast.

        • Rooster326@programming.dev
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          9 days ago

          Because we all know it will eventually go from a “neat” to mandatory with vendor lock-in for no other reason than “fuck you”.

          We’ve all seen it a few hundred times now with X, and Y.

          I get a few daily pop-ups for “Want to use a pass key”. One from my bank. No I don’t want to link my fingerprint to my bank account especially in a way that will lock me out when I replace my phone.

          Remember folks: Biometrics (What you are) is not constitutionally protected but what you know is (for now at least).

    • Fmstrat@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      7 days ago

      Not to mention Apple decided to make passkeys Airdropable. Fun.

      I worked on a cool projected called FedID: https://fedid.me/ that creates a distributed identifier (DID) out in the world, federated with AvtivityPub, and gives you a key you can sign in with via OpenID Connect. It allows the DID to have multiple keys for multiple devices, and delegate authority, so losing a device/failure is no big deal.

      That being said, Web passkeys can be stored in password managers, just like passwords.

    • l_b_i@pawb.social
      link
      fedilink
      English
      arrow-up
      1
      ·
      10 days ago

      I think they are being pushed because cool technology on paper. Whenever I read an article about them, I can’t help but think about the human factors. How are passkeys created, often by a password or email. okay… that looks a lot like a password. Oh you lost the passkey, here lets send you one again. It stinks of a second factor without a first. Sure, the passkey itself is hard to compromise, but how about its creation. If your email is compromised I see no difference from passwords or passkeys.

      • 4am@lemmy.zip
        link
        fedilink
        English
        arrow-up
        0
        ·
        10 days ago

        They don’t email you a passkey, what are you even talking about?

        • lmmarsano@lemmynsfw.com
          link
          fedilink
          English
          arrow-up
          0
          ·
          edit-2
          9 days ago

          There are quite a few uninformed takes here & the number of upvotes they got for it is stunning. Lemmy. 😞

          • Sl00k@programming.dev
            link
            fedilink
            English
            arrow-up
            0
            ·
            8 days ago

            Lemmy has been very anti passkey at least since it’s rise in 2023, it’s very interesting how tech forward Lemmy generally is and how anti passkey and not even anti, just generally uninformed on them they are.

            I for one love them. I always read everyones opinions here and just think nobody has even attempted to use them. It’s very simple.

        • l_b_i@pawb.social
          link
          fedilink
          English
          arrow-up
          0
          ·
          10 days ago

          The flow I hear about when people talk about passkeys is sign up with email. Code gets sent to email. Code is entered, passkey gets generated. There always seems to be some similar step that looks like that, and often you have new device or reset that looks the same. Sure the passkey itself is secure, but how do you get it, how do you generate it, how do you validate the first time?

    • jj4211@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      10 days ago

      Passkeys are a technology that were surpassed 10 years before their introduction

      Question is by what? I could see an argument that it is an overcomplication of some ill-defined application of x509 certificates or ssh user keys, but roughly they all are comparable fundamental technologies.

      The biggest gripe to me is that they are too fussy about when they are allowed and how they are stored rather than leaving it up to the user. You want to use a passkey to a site that you manually trusted? Tough, not allowed. You want to use against an IP address, even if that IP address has a valid certificate? Tough, not allowed.

    • cenzorrll@piefed.ca
      link
      fedilink
      English
      arrow-up
      0
      ·
      10 days ago

      I’ve found a pretty good use for a passkey. Docusign. About every 3 months I need to docusign something at work. The process involves logging in, changing your password, logging in again, opening the document, logging in to sign, logging in to finish. The only steps you get to skip if there’s more than one document is the initial log on, and changing password. So with a passkey I just touch it a bunch of times and there’s no password change.

          • bookmeat@lemmynsfw.com
            link
            fedilink
            English
            arrow-up
            0
            arrow-down
            2
            ·
            10 days ago

            There’s like a million other free/libre digital document signing platforms out there. Try one that doesn’t suck.

    • 4am@lemmy.zip
      link
      fedilink
      English
      arrow-up
      0
      ·
      10 days ago

      Password managers store passkeys. They’re portable and not device-locked. Been using them on Bitwarden for like 2 years now.

      • Brokkr@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        9 days ago

        It is not portable in the sense that you need bitwarden installed on the device you are trying to connect from.

        Passwords can be plain text, which means I can copy, paste, and dictate them to a device that does not have additional software installed.