Passkeys are built on the FIDO2 standard (CTAP2 + WebAuthn standards). They remove the shared secret, stop phishing at the source, and make credential-stuffing useless.

But adoption is still low, and interoperability between Apple, Google, and Microsoft isn’t seamless.

I broke down how passkeys work, their strengths, and what’s still missing

  • Passerby6497@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    6 hours ago

    If it’s more convenient to be insecure than secure, users will pick insecure every time. There’s a reason there are so many bad password in the top passwords in breach dumps.

    I have to tell myself every time I go through some of my login flows that inconvenience to me means more so to an attacker, but most people don’t have an adversarial mindset and just want it to work.

      • Passerby6497@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 hour ago

        No, but the two tens to be correlated.

        Example, MFA authentication is a security feature, but inconvenient as shit with low or no lifetime. Same complaints about short lived sessions on app sites. Especially when every login requires MFA…