Passkeys are built on the FIDO2 standard (CTAP2 + WebAuthn standards). They remove the shared secret, stop phishing at the source, and make credential-stuffing useless.

But adoption is still low, and interoperability between Apple, Google, and Microsoft isn’t seamless.

I broke down how passkeys work, their strengths, and what’s still missing

  • Netrunner@programming.dev
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    2
    ·
    11 hours ago

    Passkeys are cool but you still need 2fa. Which may as well be a passkey itself.

    One factor is not great even if it’s a passkey.

    • Zak@piefed.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      4 hours ago

      Need is a strong word.

      2FA is a pretty good idea for some applications and needless hassle for others. I don’t need most of my accounts to have 2FA; I use a password manager with strong unique passwords, and for many accounts, having to make a new one would be an inconvenience rather than a tragedy.

      Service providers might be motivated to force it on me if stolen accounts could cost them money, but most of them don’t need to; it’s just the most expedient move for them.

    • saltesc@lemmy.world
      link
      fedilink
      English
      arrow-up
      12
      arrow-down
      1
      ·
      11 hours ago
      1. Built-In Two-Factor Security – Passkey logins use your private key stored on your device and your face or your fingerprint or your PIN. Unlike password, these cannot be easily replicated by a scammer.
      • Pamasich@kbin.earth
        link
        fedilink
        arrow-up
        3
        ·
        8 hours ago

        This only applies though if it’s a per-device passkey that uses a private key stored securely that cannot be exported.

        If the private key can be exported, it can be stolen and the factors becomes invalid.

        But people also store their private key in cloud solutions (some here mentioned doing that) which just makes the factor invalid anyway, since then it’s not device-bound anymore, and it’s the device that verifies your identity with those methods.

        Like, what if someone hacks the cloud service storing the passkeys and steals them? Not really any different from storing passwords in a cloud, and that one isn’t called 2FA either.

      • filcuk@lemmy.zip
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        1
        ·
        11 hours ago

        Isn’t this optional? I use passkeys and have yet to be asked for anything else in addition to it.

        • hitmyspot@aussie.zone
          link
          fedilink
          English
          arrow-up
          4
          ·
          10 hours ago

          The passkey is only passed on with an unlocked device. So, if someone stole your passkey device, they can’t copy it and use it without unlocking.

          • filcuk@lemmy.zip
            link
            fedilink
            English
            arrow-up
            4
            ·
            8 hours ago

            Really? If I open github (for example) and select passkey login, I just need to press ok using Bitwarden.

            • fascicle@leminal.space
              link
              fedilink
              English
              arrow-up
              1
              ·
              7 hours ago

              Amazon always asked for 2fa and then the passkey pops up but doesn’t actually do anything other then tell me I have it enabled

    • Septimaeus@infosec.pub
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      edit-2
      10 hours ago

      You still need 2fa

      I think most passkey implementations incorporate multiple factors already. The session factor is considered distinct from the device factor, even if it’s all on the same device.

      Which isn’t super different from the traditional USB key procedure, where a user would activate a FIDO biometric after clearing an SSO portal, or what have you.

    • Zwuzelmaus@feddit.org
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      11 hours ago

      Passkeys are cool but you still need 2fa.

      How do you use it then if you need to share access in the whole team?

      • Doccool@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        10 hours ago

        You don’t share your personal password across the whole team now, do you? At least for your teams sake I hope you don’t.

        • gian @lemmy.grys.it
          link
          fedilink
          English
          arrow-up
          1
          ·
          7 hours ago

          Obviously not the personal password, but sometimes you need to share a password. Think about the password for a remote desktop your team may need to connect to for troubleshooting a problem for example.

          • Doccool@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            2
            ·
            9 hours ago

            I think that’s the problem right there… If you share accounts across multiple people you have far greater problems than how passkeys work…

            • Passerby6497@lemmy.world
              link
              fedilink
              English
              arrow-up
              3
              ·
              9 hours ago

              Or they’re using it as intended. I’ve had more than one account I’ve gotten by cost sharing with friends. That’s not a problem, that’s a solution.

              • morriscox@lemmy.world
                link
                fedilink
                English
                arrow-up
                2
                ·
                2 hours ago

                And it only takes one person with a grudge to cause a problem. I have seen it. I have shared accounts but very carefully and if someone abuses it then they permanently lose access to my stuff even if they are family.

        • Zwuzelmaus@feddit.org
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          1
          ·
          10 hours ago

          share your personal password

          We share a password. Then we don’t call it a personal password anymore. Was that your question?