Passkey is some sort of specific unique key to a device allowing to use a pin on a device instead of the password. But which won’t work on another device.

Now I don’t know if that key can be stolen or not, or if it’s really more secure or not, as people have really unsecure pins.

  • Engywuck@lemm.ee
    link
    fedilink
    English
    arrow-up
    32
    arrow-down
    3
    ·
    1 year ago

    I don’t think that access to your personal data/email/files being dependent on a battery-powered electronic device is a great idea, to be honest.

    • alvvayson@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      arrow-down
      5
      ·
      1 year ago

      That’s why they invented chargers, eh.

      But more seriously, there are recovery procedures if you lose a phone with or without a backup and if you are willing to share the keys with a cloud provider, you can also store them there and use them on any of your devices.

      Or you can get something like a yubikey if the battery aspect is really that problematic for you.

      • Engywuck@lemm.ee
        link
        fedilink
        English
        arrow-up
        14
        arrow-down
        4
        ·
        1 year ago

        The fact is that I fail to see something obviously wrong with outrageously long/complicated passwords managed by e.g. Bitwarden or the likes.

        • alvvayson@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          arrow-down
          11
          ·
          1 year ago

          Bitwarden is also supporting passkeys, so it won’t make a difference for their users whether they use passwords or passkeys.

          And the fact that you don’t see anything wrong is more a you problem. Boomer mentality, dude. Don’t became one.

          • V0lD@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            arrow-down
            1
            ·
            1 year ago

            What do you see that’s wrong with it that we don’t if I may ask?

            • DeadlineX@lemm.ee
              link
              fedilink
              English
              arrow-up
              7
              ·
              1 year ago

              Mostly phishing. Passkeys can’t be phished. And really, passwords are awful in general for security purposes. You don’t have to use your phone or google or apple or whatever.

              I actually have a physical usb key that I use as a passkey. Its just a more secure login implementation and will likely be the only option in the future.

              • hedgehog@ttrpg.network
                link
                fedilink
                English
                arrow-up
                2
                ·
                1 year ago

                Passkeys can be phished, it’s just much more difficult than with passwords, TOTP MFA, SMS MFA, other OTPs, or push notification-based MFA (e.g., Duo or the way Microsoft, Apple, and Google push a notification to their app and you confirm and/or enter the key).

                Passkey is extremely phishing resistant in the same as Webauthn MFA and U2F MFA are, in that origin checks by the browser prevent attackers from initiating the auth process. But it can still be attacked in these ways:

                1. XSS bug in the target website
                2. Browser vulnerability
                3. Malicious browser (not a concern on iOS but a concern everywhere else)
                4. Compromise of any cert in the chain between you and the target website
                5. Convincing the user to install (or using malware to install) a root certificate, or compromising one you already installed (e.g., for work)
                6. Bookmarklet/clipboard/devtools attacks

                From memory, passkeys, webauthn, and u2f should prevent over 99% of phishing attacks that are successful without them in place.

                There’s also the risk of the passkey itself being compromised, though that level of risk is dependent on your device / how you’re storing your passkeys and isn’t a “phishing” risk.

                • Natanael@slrpnk.net
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  ·
                  1 year ago

                  The main point is all those attacks need to attack the local software or hardware implementation on one of the two ends (or a cert issuer), and even then it’s replay protected so for example an XSS attack lasts only for one session, so it’s more robust.

                  • hedgehog@ttrpg.network
                    link
                    fedilink
                    English
                    arrow-up
                    1
                    ·
                    1 year ago

                    Correct, but that doesn’t change the fact that “Passkeys can’t be phished” is not true.

    • AA5B@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      My understanding of Apple Keychain is that every credential is useable from every device, and can be backed up and restored to a new device. Most importantly Apple doesn’t have access, although we have to trust them on that