142

“Passkeys,” the secure authentication mechanism built to replace passwords, are getting more portable and easier for organizations to implement thanks to new initiatives the FIDO Alliance announced on Monday.

top 50 comments
sorted by: hot top controversial new old
[-] corsicanguppy@lemmy.ca 3 points 3 hours ago

Does it require an array of fucking containers and a flurry of webAPI calls? Then no.

[-] NateNate60@lemmy.world 7 points 7 hours ago

I still have no idea how to use passkeys. It doesn't seem obvious to the average user.

I tried adding a passkey to an account, and all it does is cause a Firefox notification that says "touch your security key to continue with [website URL]". It is not clear what to do next.

[-] JackbyDev@programming.dev 1 points 1 hour ago

After my password manager auto filled a password and logged me in the website said "Tired of remembering passwords? Want to add a passkey?" I didn't know what it meant so I said no lol.

[-] echodot@feddit.uk 1 points 5 hours ago

I think you actually have to buy a passkey device. Then configure it to work with a particular account.

You plug the passkey into your computer and then whenever it asks for a password you literally touch it and it does its thing. I think there are options like biometrics that you can add on top but you don't have to have that.

[-] el_abuelo@programming.dev 2 points 4 hours ago

Devices themselves can act as passkeys too - I.e. your phone, laptop etc...

[-] xor@lemmy.blahaj.zone 1 points 2 hours ago

...except the ones that can't

I think it depends on whether you have a TPM chip in it

[-] el_abuelo@programming.dev 1 points 2 hours ago

Thanks for clarifying

[-] NateNate60@lemmy.world 4 points 5 hours ago

If that's what's needed, I can say with some certainty that adoption isn't going to be picking up any time this decade.

[-] echodot@feddit.uk 1 points 3 hours ago

They've been around forever as a concept I think I even have one for accessing some servers at work. You're right no one uses them.

[-] EncryptKeeper@lemmy.world 21 points 14 hours ago* (last edited 14 hours ago)

ITT: Incredibly non-technical people who don’t have the first clue how Passkeys work but are convinced they’re bad due to imaginary problems that were addressed in this very article.

[-] priapus@sh.itjust.works 9 points 14 hours ago

This is a weird thread. Lots of complaints about lock in and companies managing your keys, both of which are easily avoidable, the exact same way you'd do so with your passwords.

[-] Sl00k@programming.dev 3 points 13 hours ago

Also the people talking about added complexity? I'm convinced all the complaints are from people who haven't set one up or used one and are immediately writing it off. Adding one is a single click of a button.

Then to sign in I literally just get a thumbprint request on my phone after entering my username. It's far far simpler than passwords and MFA.

[-] nevemsenki@lemmy.world 109 points 1 day ago

If the passkeys aren't managed by your devices fully offline then you're just deeper into being hostage to a corporation.

[-] Draconic_NEO@lemmy.world 5 points 8 hours ago

That's a great way to lose access if your device gets lost, stolen, or destroyed. Which is why I'm against and will continue to be against forcing 2FA and MFA solutions onto people. I don't want this, services don't care if we're locked out which is why they're happy to force this shit onto people.

[-] nevemsenki@lemmy.world 2 points 7 hours ago

Well yeah, that is true. Security and convenience are usually at odds... MFA has place, unless you don't mind some guy from russia access your online bank account ; but I definitely wouldn't use it on all my accounts.

[-] Draconic_NEO@lemmy.world 4 points 6 hours ago

Yeah and since Online bank accounts can also almost always be reset if you lose the 2FA/MFA key by calling customer support, or going to your bank and speaking with themt in person, there's almost no risk of losing access completely. It's a service you have access to because you're you. Something that isn't the case with Reddit, Github, Lemmy accounts, or Masotodon. I'm not able to regain access after losing those 2FA solutions by virtue of being myself, they treat you just like the attacker in those cases. Really not worth it there, both since what is being protected isn't worth it, and the risk far outweighs it.

[-] kiagam@lemmy.world 2 points 3 hours ago

Access to my main email account (outlook) is currently blocked because someone decided to try a password from some earlier leak and locked it. It can only be unlocked with SMS MFA, which I can't use because I'm travelling abroad. There is no other way to do it. The other option they give you a form that only works if you don't have MFA set up (it says so on the faq). I even asked someone to fill the form from my home computer so the location data matches earlier accesses, but didn't work. You also can't contact support without logging in. If I had lost/changed that phone number for any reason, I would lose access forever. Luckily I will be back home soon.

[-] rottingleaf@lemmy.world 3 points 7 hours ago

Y'all here talking so smart ignore another thing - the more complex your solutions are, the deeper you are into being hostage to everyone capable of making the effort to own you.

Don't wanna be hostage - don't use corporate and cloud services for things you need more than a bus ticket.

You are being gaslighted to think today's problems can be solved by more complexity. In fact the future is in generalizing and simplifying what exists. I'm optimistic over a few projects, some of which already work, and some of which are in alpha.

[-] Archer@lemmy.world 1 points 2 hours ago

Thank goodness you didn’t mention any names

[-] rottingleaf@lemmy.world 1 points 1 hour ago

Projects don't react too well to premature attention.

[-] fmstrat@lemmy.nowsci.com 1 points 7 hours ago

Not to mention Apple let's you SHARE them with airdrop.

[-] unskilled5117@feddit.org 29 points 21 hours ago* (last edited 21 hours ago)

The lock-in effect of passkeys is something that this protocol aims to solve though. The “only managed by your device” is what keeps us locked in, if there is no solution to export and import it on another device.

The protocol aims to make it easy to import and export passkeys so you can switch to a different provider. This way you won’t be stuck if you create passkeys e.g. on an Apple device and want to switch to e.g. Bitwarden or an offline password manager like KeyPassXC

The specifications are significant for a few reasons. CXP was created for passkeys and is meant to address a longstanding criticism that passkeys could contribute to user lock-in by making it prohibitively difficult for people to move between operating system vendors and types of devices. […] CXP aims to standardize the technical process for securely transferring them between platforms so users are free […].

[-] RecluseRamble@lemmy.dbzer0.com 1 points 4 hours ago

And who forces all the corps to correctly implement that protocol? Getting you locked in is in all of their interests, after all.

[-] unskilled5117@feddit.org 2 points 3 hours ago* (last edited 3 hours ago)

I think it‘s fair to remain skeptical but the big organizations were part of the development, so there seems to be some interest. And it‘s not always in their interest to lock users in, when it also prevents users from switching to their platform.

Development of technical standards can often be a fraught bureaucratic process, but the creation of CXP seems to have been positive and collaborative. Researchers from the password managers 1Password, Bitwarden, Dashlane, NordPass, and Enpass all worked on CXP, as did those from the identity providers Okta as well as Apple, Google, Microsoft, Samsung, and SK Telecom.

[-] nevemsenki@lemmy.world 15 points 21 hours ago* (last edited 21 hours ago)

That's between platforms though. I like my stuff self-managed. Unless it provenly works with full offline solutions I'll remain sceptical.

[-] darklamer@lemmy.dbzer0.com 10 points 14 hours ago

I like my stuff self-managed.

Bitwarden / Vaultwarden is a popular available working solution for self-hosting and self-managing passkeys (as well as passwords).

[-] EngineerGaming@feddit.nl 1 points 5 hours ago

TBH I don't see a reason why something as simple as a password manager needs a server, selfhosted or not. I don't get the obsession with syncing everything, so would rather stick with normal KeepassXC.

[-] synestine@sh.itjust.works 2 points 4 hours ago

Have you never lost your password device (phone, laptop, etc) suddenly and unexpectedly? That's when you really want that file synced somewhere else. But then it's too late. Bonus on many password vault servers is shared folders, so one can share their garage door code with the family but keep the bank account details to oneself.

[-] EngineerGaming@feddit.nl 1 points 33 minutes ago* (last edited 33 minutes ago)

No, but this is very unlikely because I do keep regular backups manually. I just don't feel the need for it to be a constantly-online server.

load more comments (1 replies)
[-] HubertManne@moist.catsweat.com 18 points 19 hours ago

The real problem is not passwords so much as trusted sources. Governments should have an email account that citizens have a right to and will not go away and have local offices to verify access issues.

[-] echodot@feddit.uk 4 points 5 hours ago* (last edited 5 hours ago)

I don't want my government hosting my email.

The last time they had to do anything important they stoled all the sensitive data in plain text in an Excel spreadsheet and then the spreadsheet got corrupted so they lost everything. Of course they didn't have backups.

[-] Wispy2891@lemmy.world 2 points 4 hours ago

But at least since it was stolen, the backup was hosted for free on the hacker forums /s

[-] Kuvwert@lemm.ee 6 points 9 hours ago

No. Wtf no.

[-] SkaveRat@discuss.tchncs.de 0 points 5 hours ago

Whatever you're smoking, do less of that

[-] helenslunch@feddit.nl 6 points 13 hours ago

I bet the gov would love to host your email and have access to all the same info Google does...

[-] Gutless2615@ttrpg.network 56 points 23 hours ago* (last edited 23 hours ago)

Literally just use a password manager and 2/MFA. It’s not a problem. We have a solution.

[-] shortwavesurfer@lemmy.zip 40 points 23 hours ago

Actually, it is still a problem, because passwords are a shared secret between you and the server, which means the server has that secret in some sort of form. With passkeys, the server never has the secret.

load more comments (13 replies)
[-] huginn@feddit.it 23 points 21 hours ago

Never forget that technologically speaking you're nothing like the average user. Only 1 in 3 users use password managers. Most people just remember 1 password and use it everywhere (or some other similarly weak setup).

Not remembering passwords is a huge boon for most users, and passkeys are a very simple and secure way of handling it.

[-] funkless_eck@sh.itjust.works 20 points 21 hours ago

I work for multiple organizations. The majority of which have a Google sheet with their passwords in that are

      c0mpanyname2018! 

Those that aren't are

       pandasar3cute123? 
[-] echodot@feddit.uk 2 points 5 hours ago* (last edited 5 hours ago)

At one point the organization I work for had a password that was literally Password-022!, guess what it was the following month?

[-] undefined@links.hackliberty.org 1 points 9 hours ago

I had to start hashing passwords and sending it to the haveibeenpwned API.

I also fight with my users over data normalization because any time I add some rule (like don’t put “SO#” as part of the value of the “SO#” field), they’re too stupid to realize the point and find some other “hack” around it.

load more comments (1 replies)
load more comments (1 replies)
[-] aniki@lemmings.world 45 points 23 hours ago

I'll switch when it's fully implemented in open source and only I am the one with the private key. Until then its just more corporate blowjobs with extra steps.

[-] priapus@sh.itjust.works 8 points 14 hours ago

What do you means by this? What part do you want to be open source? Passkey are just cryptographic keys, no part of that requires anything unfree. There's aready an open source authentication stack you can use to implement them. You can store them completely locally with KeyPassXC for selfhost Vaultwarden to store them remotely. Both are open source?

[-] 4am@lemm.ee 20 points 21 hours ago

That’s exactly how passkeys work. The server never has the private key.

load more comments (5 replies)
load more comments
view more: next ›
this post was submitted on 15 Oct 2024
142 points (91.8% liked)

Technology

58682 readers
4043 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS