Passkeys are built on the FIDO2 standard (CTAP2 + WebAuthn standards). They remove the shared secret, stop phishing at the source, and make credential-stuffing useless.

But adoption is still low, and interoperability between Apple, Google, and Microsoft isn’t seamless.

I broke down how passkeys work, their strengths, and what’s still missing

  • smiletolerantly@awful.systems
    link
    fedilink
    English
    arrow-up
    1
    ·
    10 days ago

    You can store Passkeys in open source password managers.

    I don’t know most of my passwords, so the step to passkeys doesn’t feel like a big one. I also really like the flow of pressing Login; Bitwarden pops up a prompt without me initiating it; I press confirm. Done, logged in, and arguably more secure due to the surrounding phishing and shared secrets benefits.

    • Brokkr@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      10 days ago

      Sure, they probably work great when you have your *passkey manager on the device, but that’s not when I need to have backup routes into my accounts. When using a new device, or someone else’s, having even a complicated password that can be typed or copied-pasted has way more functionality.

      As far a I can tell, using passkeys would only risk locking me out of my accounts. Everyone else is already effectively locked out.

          • lmmarsano@lemmynsfw.com
            link
            fedilink
            English
            arrow-up
            0
            arrow-down
            1
            ·
            9 days ago

            Isn’t that the same thing? All my credentials & passkeys are in the cross-platform password manager available from all my devices & any web browser. Passkeys even have a cross-device flow, so we can just scan a QR code & use a phone to sign into anything.

            Manually keying in a password just feels so boomer.

      • Vittelius@feddit.org
        link
        fedilink
        English
        arrow-up
        0
        ·
        8 days ago

        You could also use dedicated hardware to store your keys. Any FIDO USB key will do. I have a Yubikey that cost me less than 30 bucks.

        It’s really handy, because I frequently use someone else’s device for work. All I have to do is plug it in, press the button on the key and enter the master password for the passkey storage. It’s like having a password manager on a USB stick.

    • Septimaeus@infosec.pub
      link
      fedilink
      English
      arrow-up
      0
      ·
      9 days ago

      Yeah the moods in this thread, like

      “[I don’t understand this]!”

      “[I don’t trust this]!”

      “[It doesn’t fix everything]!”

      “[This doesn’t benefit me]!”

      “[What’s wrong with old way]!?”

      And like, all valid feelings… just the reactions are a bit… intense? Especially considering it’s a beta stage auth option that amounts to a fancy version of the old sec key industry standard, not the mark of the beast.

      • Rooster326@programming.dev
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        9 days ago

        Because we all know it will eventually go from a “neat” to mandatory with vendor lock-in for no other reason than “fuck you”.

        We’ve all seen it a few hundred times now with X, and Y.

        I get a few daily pop-ups for “Want to use a pass key”. One from my bank. No I don’t want to link my fingerprint to my bank account especially in a way that will lock me out when I replace my phone.

        Remember folks: Biometrics (What you are) is not constitutionally protected but what you know is (for now at least).