[HN Gopher] Passkeys: The beginning of the end of the password
       ___________________________________________________________________
        
       Passkeys: The beginning of the end of the password
        
       Author : donohoe
       Score  : 380 points
       Date   : 2023-05-03 12:13 UTC (10 hours ago)
        
 (HTM) web link (blog.google)
 (TXT) w3m dump (blog.google)
        
       | TheChaplain wrote:
       | And if you have your google account banned/disabled for whatever
       | reason, then what?
        
         | toomuchtodo wrote:
         | Passkeys should still be on your local device. Account recovery
         | should fall back to e-mail magic link or government credential
         | proofing (depending on data sensitivity and threat model).
         | 
         | (manages customer IAM for a FinTech)
        
           | garganzol wrote:
           | And when that last device dies in an accident or force major,
           | what's next? Proofing won't work because if the solution is
           | really as secure as it should be then neither party can have
           | access in an unencrypted form.
        
             | [deleted]
        
         | [deleted]
        
         | jahnu wrote:
         | Indeed I wouldn't trust Google or Apple to be the only place my
         | passkeys are stored. I'm currently a 1Password user and their
         | upcoming support looks like it could address this issue (I'm
         | not in any way affiliated with them)
         | 
         | https://www.future.1password.com/passkeys/
        
           | sebk wrote:
           | Sure but this currently means a virtual authenticator that
           | puts unwrapped passkeys in the same memory as other
           | applications, leaving only the OS and no other physical
           | measures to protect a direct-memory read. That might be
           | acceptable for your threat model, but no other currently
           | adopted WebAuthn authenticators work this way other than
           | password managers that don't want to be left out.
           | 
           | Hopefully in the future OSs will have better APIs to allow
           | third-party tools like 1Password to leverage hardware
           | components like TPMs and Secure Enclaves to build a sync
           | fabric that's not tied to the hardware vendor, but this does
           | not currently exist and is not trivial to implement without
           | significant consideration about phishing.
           | 
           | I think YubiCo and password managers have a tremendous
           | opportunity here to partner up to build sync fabrics
           | bypassing OS vendors that might not be as incentivized to
           | provide these APIs now, but I don't believe it's moving,
           | currently.
           | 
           | Additionally, when you say you wouldn't trust Google or Apple
           | to be the _only_ place your passkeys are stored, it's likely
           | that even if we can have third-party sync fabrics, that these
           | will never be interoperable. I don't believe you'll be able
           | to "export" a Passkey from your iCloud ecosystem and import
           | it into the 1Password ecosystem as you can do today with
           | passwords. Doing so would break assumptions about the
           | strength of the authenticator as far as WebAuthn is
           | concerned, and would weaken Apple's security posture as well.
           | Instead you'd probably have to maintain _both_ sync fabrics
           | independently with every service you sign up for.
        
             | jahnu wrote:
             | Thanks for that info! Still just learning about this stuff.
        
       | discerning_ wrote:
       | Doesn't support yubikey even though yubikey supports fido2 and
       | passkeys.
        
       | hanniabu wrote:
       | Sign in with ethereum is my preference
       | 
       | https://login.xyz/
        
       | garganzol wrote:
       | Please don't. In case of emergency, all that fancy stuff is
       | unrecoverable - while passwords continue to work.
        
       | uni_baconcat wrote:
       | Passkey is convenient and safer than password, but all of that is
       | based on the trust of 'trusted device'.
        
       | SadWebDeveloper wrote:
       | This looks and feels like passwords with extra steps...
       | 
       | I mean now i need to "store, manage and secure" my per-user-
       | certificate sorry "my passkey" myself and if its get compromised
       | its my fault, how are passkeys more "secure" than enforcing a
       | secure long password that the user can't change unless he met
       | certain conditions and its conveniently stored inside the
       | password manager i just built.
       | 
       | What happens if i lost all my devices due to a fire? at least a
       | password let me still access things we these i might need to
       | prove again that i am me, it might even be more easy to steal
       | accounts because i can ask google to change it because i lost my
       | passkey.
        
         | dcow wrote:
         | The solution, for you, is a cloud synced passkey manager,
         | possibly a custodial one.
         | 
         | A password manager with strong passwords is weaker than a
         | password manager with passkeys, because passkeys use asymmetric
         | crypto and passwords+2fa involve exchanging a shared secret
         | over an insecure channel at some point (yes I'm considering
         | 1-sided TLS an "insecure" channel here).
         | 
         | Trust the security experts when they say passkeys are more
         | secure. Now, solving the UX to make it match that of passwords
         | plus managers today _is the_ problem, agree.
        
           | lxgr wrote:
           | > The solution, for you, is a cloud synced passkey manager
           | 
           | This is in fact the only possible solution you get on iOS,
           | and the default solution on Android.
        
           | compiler-guy wrote:
           | > Trust the security experts when they say passkeys are more
           | secure.
           | 
           | I trust the security experts when they say passkeys resist
           | various attacks better than current systems...
           | 
           | > Now, solving the UX to make it match that of passwords plus
           | managers today is the problem, agree.
           | 
           | ... but poor UX makes it likely the users will end up doing
           | things that are less secure, not adopting them at all, or
           | messing things up themselves in such a way that they lock
           | themselves out of their accounts.
           | 
           | So until the UX issues are fixed, "more secure" only in the
           | narrow definitions that sophisticated security folks worry
           | about. If the folks I support blow it, it doesn't matter that
           | some mostly theoretical MITM attack was prevented.
        
             | dcow wrote:
             | Understood completely. I was only trying to articulate that
             | there _are_ tangible security benefits to using passkeys
             | over passwords and no /zero theoretical downsides. A 32byte
             | random password is just an edDSA private key that's not
             | private, after all, and the two can be managed the exact
             | same way with none of the device-bound woes. That is, all
             | assuming that platform vendors commit to providing the same
             | affordances for passkeys as they do for passwords in terms
             | of allowing users to delegate to 3rd parties to complete
             | signing of the WebAuthN challenge.
             | 
             | I also believe that Apple/Google/Microsoft understand the
             | importance of not having a "I lost my device all my stuff
             | is toast" UX, which is why Apple requires iCloud keychain
             | to enable passkeys. They are making a pretty strong
             | statement that the UX they imagine working for the masses
             | is not some rigid "no cloud no syncing not here not ever"
             | stance. So I think they realize it has to be a solution
             | that doesn't have that failure mode. They're okay with soft
             | keys, which is at least a relief.
        
         | lxgr wrote:
         | Passwords can be both stolen (they are valid for multiple
         | authentications) and are susceptible to phishing/MITM attacks.
         | 
         | TOTP/HOTP solves the first problem by making the credential
         | provided during authentications single-use, but they're still
         | susceptible to phishing/MITMs (since you don't know where
         | you're entering your OTP).
         | 
         | WebAuthN solves both.
         | 
         | > What happens if i lost all my devices due to a fire?
         | 
         | Passkeys are synchronized to your device ecosystem vendor by
         | default (i.e. Google or Apple, and soon also third-party
         | password maangers on Android), for better or worse.
        
           | JohnFen wrote:
           | > Passkeys are synchronized to your device ecosystem vendor
           | by default (i.e. Google or Apple, and soon also third-party
           | password maangers on Android)
           | 
           | That's a showstopper for me, personally. Not saying the idea
           | is a bad one (at all!), but I won't be using it for myself.
        
             | lxgr wrote:
             | Me too - I'd much rather trust my password manager, so I'm
             | hoping that platform/browser APIs will eventually become
             | available that will allow such third-party implementations.
             | (Android is planning to; iOS hasn't stated anything yet.)
             | 
             | Even then I would probably not add my bank credentials or
             | other high-sensitivity things there.
        
           | garganzol wrote:
           | > Passkeys are synchronized to your device ecosystem ... and
           | soon also third-party password maangers on Android
           | 
           | And at that point they make a full circle becoming just
           | passwords with a master password. Essentially what password
           | managers already do. You already can tie a master password to
           | a biometric or another factor.
        
             | lxgr wrote:
             | Not quite: Passwords are long-lived bearer tokens, which
             | can be phished/MITMed (exclusively using auto-fill helps,
             | but non-technical users are still prone to be phished) and
             | are administratively harder to securely manage on the
             | backend of the relying party.
        
       | alkonaut wrote:
       | Did anyone else get an email from Google about this, with a link
       | I'm supposed to click on iOS, but which is broken? Did Google
       | really email all their iOS+Google users a broken link?
        
       | kroeckx wrote:
       | Is a passkey a software implementation of a FIDO key? Where the
       | implementation could use something like the TPM to protect the
       | key.
        
       | eviks wrote:
       | Since you lose the "something you know" factor with passkey-only
       | authentication (e.g., with face scans), would it not be better to
       | allow to add a (much shorter due to the passkey) password as well
       | as an optional extra factor?
        
       | cbeach wrote:
       | Anyone know if it's possible to use this with Google Workspace
       | accounts yet?
       | 
       | From the Google Blog I clicked on "Today, passkeys for Google
       | Accounts are available. You can try them out here"
       | 
       | However, I got: "Passkeys aren't allowed on this account. Contact
       | your admin for help"
       | 
       | And the Workspace admin page doesn't seem to include any options
       | for Passkeys.
        
         | dhess wrote:
         | Same here, but note that in this post on the Google Security
         | Blog:
         | 
         | https://security.googleblog.com/2023/05/so-long-passwords-th...
         | 
         | the first sentence reads, "Starting today, you can create and
         | use passkeys on your _personal_ Google Account. " (Emphasis
         | mine.)
        
           | tytso wrote:
           | Disclaimer: I work for Google but nothing I say here is
           | Google's opinion or relies on any Google internal
           | information.
           | 
           | I'm not surprised that Workspace accounts weren't included in
           | the initial rollout. Workspace setups have interesting
           | requirements that aren't necessarily there for personal
           | accounts. For example, under some circumstances, if an
           | employee gets hit by a bus, and there is critical business
           | data which is stored in the employee's account, an
           | appropriately authorized Workspace admin is supposed to be
           | able to gain access to the employee's account. But what is
           | the right thing to do for passkey access? Especially if the
           | user uses passkey to authenticate to some non-:Google
           | resource like, say, Slack which has been set up for corporate
           | use? Should the workspace admin be able to impersonate the
           | corporate employee in order to gain access to non-Google
           | resources via passkey? What about if the employee
           | (accidentally) uses their corporate account to set up a
           | passkey to a personal account, such as for example E*Trade?
           | Maybe the Workspace admin should have a setting where passkey
           | creation is disabled except for an allowlist of domains that
           | are allowed for corporate workflows? It's complicated, and if
           | I were the product manager, I'd want to take my time,
           | understand all of the different customer requirements (where
           | customer === the Workspace administrator who is paying the
           | bills) before rolling out support for Workspace accounts.
        
       | falcolas wrote:
       | Auth is as secure as the weakest link - in the case of this it's
       | your email and/or customer service
       | 
       | To put it another way, it's not really any more secure than
       | passwords.
       | 
       | Sure, there's a lower risk of password breaches, but if you're
       | the target audience for passkeys, you probably also use a
       | password manager with unique passwords per site (even if that
       | manager is the one built into your browser and synced across your
       | devices).
        
         | judge2020 wrote:
         | > but if you're the target audience for passkeys
         | 
         | This is the difference. With the big players pushing it,
         | including Apple instructing developers on the best way to
         | integrate passkeys in their apps[0], it's going to overall
         | shift more people from passwords to passkeys (especially when
         | developers prioritize passkeys during signup).
         | 
         | 0:
         | https://developer.apple.com/documentation/authenticationserv...
        
           | falcolas wrote:
           | I have... doubts. Already webauthn isn't prompting for
           | passkeys on Apple. Chrome wants a bluetooth connection out of
           | the box, and firefox does its own internal auth path that
           | doesn't involve the OS.
           | 
           | Chrome and Edge on Windows are the only ones that prompt me
           | for passkeys today (Firefox tries to use Windows for auth,
           | which throws up a scary prompt).
        
             | judge2020 wrote:
             | I don't follow for these
             | 
             | > Already webauthn isn't prompting for passkeys on Apple.
             | 
             | It does for me on iOS, at least (and Safari on MacOS; other
             | browsers don't use the native icloud passkeys, chrome has
             | its own secret store).
             | 
             | > Chrome wants a bluetooth connection out of the box,
             | 
             | IIRC it works without it for on-device passkeys, but caBLE
             | requires Bluetooth to facilitate proximity passkey
             | connections if you want to use wireless webauthn.
        
               | falcolas wrote:
               | > other browsers don't use the native icloud passkeys,
               | chrome has its own secret store
               | 
               | > but caBLE requires Bluetooth to facilitate proximity
               | passkey connections if you want to use wireless webauthn.
               | 
               | And that's the problem. The lack of a cross
               | browser/device/os standard. You can't create a secure
               | authentication chain - let alone replace passwords -
               | without standards that are broadly accepted; without
               | broadly _accepted_ standards. To do otherwise means you
               | have to train your average Jack on 4 (or more) different
               | ways to authenticate to one service.
               | 
               | And the way they'll pick? Passwords. Because they know
               | how to use passwords.
        
         | seti0Cha wrote:
         | > Auth is as secure as the weakest link
         | 
         | True if you are being specifically targeted, but there are
         | whole classes of vulnerability that you are better off not
         | having even if you have less than perfect opsec. To take an
         | extreme example, my personal server may have an unpatched
         | vulnerability that a determined attacker might exploit, but
         | that doesn't imply I might as well share the same password
         | across all my accounts.
        
           | falcolas wrote:
           | > that doesn't imply I might as well share the same password
           | across all my accounts
           | 
           | Irrelevant to the argument I made. My argument already
           | assumes you're using unique passwords, since it's made quite
           | simple these days.
        
             | seti0Cha wrote:
             | My example appears to have distracted you from the point I
             | was making. Let me make the point again without an example:
             | being vulnerable to one attack does not mean there's no
             | value in not being vulnerable to another attack when the
             | attacks require different strategies and levels of effort.
             | Or again: making breeching security more difficult does in
             | fact reduce your risk of random security breeches. Or to
             | put it another way, a determined attacker will search for
             | an opening, an opportunistic attacker will move on. There's
             | value in protecting yourself from opportunistic attacks.
        
               | falcolas wrote:
               | Changing out passwords for passkeys does not improve
               | security in anything but a theoretical manner.
               | 
               | Good passwords (stored on the backend with a password-
               | optimized hash) are pretty close to bulletproof, and all
               | browsers that I've used in the last few years prompt you
               | with very good passwords.
               | 
               | Again, the key is that people who would use passkeys are
               | the same ones who will be using good, non-reused
               | passwords in the first case. We've taught non-technical
               | users too well that they should not pay attention to out-
               | of-browser prompts, so they're not going to be able to
               | use passkeys without significant and broad re-training.
        
       | okhuman wrote:
       | run your own passkey server with
       | https://github.com/authcompanion/authcompanion2
        
       | gst wrote:
       | Just a heads-up if you're planning to use passkeys with
       | iOS/macOS: Might be fixed already, but last time I tried it out
       | it seemed like iOS only stored a single passkey per domain. If
       | you first store a passkey for a@domain and then later on store a
       | passkey for a different user b@domain the a@domain passkey is
       | overwritten without any warning. Or at least this seemed to be
       | the case a couple of months ago when I tried it out.
        
         | ezfe wrote:
         | That would only happen if the site isn't properly giving the
         | passkeys identifiers. Having single passkey/username combo is
         | working as intended, but it shouldn't be overwriting different
         | usernames.
        
         | judge2020 wrote:
         | All the way back in iOS 15, when getting passkeys meant
         | building an xcode app to access the developer menu and enable
         | passkeys, I had no trouble storing multiple per domain when
         | adding passkeys to GitHub. Maybe the site you were trying to
         | use sent the same `user.id` for both requests? /shrug
        
         | asimpletune wrote:
         | For me at least it works. I have multiple accounts for the same
         | domain and iOS/macOS prompt me to choose from the last one
         | used, or I can choose to pick from a collection.
        
       | tommiegannert wrote:
       | I just started looking into WebAuthn this week, and was annoyed
       | that there is no simple way to begin: Chrome (on Ubuntu) doesn't
       | provide a local authenticator, unless you use an emulated one.
       | This means any site that wishes to use WebAuthn can't just say
       | "let's do it for everyone," because not everyone might have a
       | phone they want to use, or a security key.
       | 
       | I found out [1] that WebCrypto + IndexedDB is pretty much the
       | missing piece, where you can store/retrieve a generated CryptoKey
       | without having access to the private data. I wish the WebAuthn
       | API would handle that for me...
       | 
       | The end-result is likely that everyone is using WebAuthn as a
       | 2FA, rather than a password replacement, because on-boarding
       | seems to suck right now.
       | 
       | [1] https://stackoverflow.com/a/49479890
        
       | ilyt wrote:
       | That kinda looks like vendor-locked equivalent of pub/privkey
       | auth ?
        
       | rgrmrts wrote:
       | My understanding of passkeys was that they replace passwords, but
       | a few places where I've seen them implemented just use passkeys
       | as a second factor, NOT a replacement for passwords themselves.
       | 
       | Can anyone who knows more about passkeys explain why this is the
       | case? Are service providers just misusing passkeys as the second
       | factor, or do I misunderstand passkeys?
        
       | mark242 wrote:
       | I don't know if this is the correct tactical implementation,
       | relies upon having a cloud-based account that never goes away or
       | gets disrupted in any fashion etc etc etc etc.
       | 
       | However! If you have built any product which has gotten traction,
       | you know just how much of a pain auth still is in 2023. It will
       | always be your number one customer service pain point -- either
       | unable to remember the email address your users signed up with so
       | they can't initiate a reset password flow, or not getting an OOB
       | email to start said flow, and so on. Auth in its current state is
       | a complete drain on company time, resources, and money.
       | Extrapolating out, I really wonder what a raw cost of the world's
       | total GDP is taken up by dealing with auth issues.
       | 
       | Any kind of breakthrough here would be such a net benefit to the
       | human race as a whole. Even the half step of OAuth, even with all
       | of its complexity and "did I use Google or Facebook or Apple to
       | sign into this site?", even that reduced friction enough to be
       | such a material benefit to customer service. If we can make
       | signing into a service as easy as unlocking your phone, there
       | would be a huge productivity jump.
        
       | karaterobot wrote:
       | > the same way they unlock their devices: with a fingerprint, a
       | face scan or a screen lock PIN
       | 
       | I am not a cryptographer: why would a 6-digit screen lock PIN
       | with this system be any safer than a 6-digit numeric password on
       | the web (i.e. not very)?
        
         | Scion9066 wrote:
         | Generally, most devices don't encrypt/protect your data with
         | that 6-digit PIN directly. They store the important secrets
         | like device encryption keys in some kind of secure
         | enclave/processor that does things like rate limit the PIN
         | attempts to prevent brute-forcing. What the fingerprint or face
         | scan is doing is just unlocking that secured data a different
         | way.
        
         | seti0Cha wrote:
         | If your physical device can be unlocked remotely with a 6 digit
         | number, not much, but that's not generally the case.
        
         | croes wrote:
         | Many phones block access after too many false PINs, if the web
         | password has the same feature there is no difference.
        
         | alwaysbeconsing wrote:
         | In order to exploit the 6-digit password across the web, the
         | attacker needs 1) the password, 2) web access from anywhere in
         | the world. To exploit the PIN guarding your phone, the attacker
         | needs 1) the PIN, 2) your phone. You can't prevent the attacker
         | from having access to the internet, but you are probably
         | reasonably good at protecting your phone physically.
        
       | hk1337 wrote:
       | I don't mean this to be negative as much as an observation but it
       | seems like it's Google's version of "Sign in with Apple ID"?
       | Apple ID only works with Apple devices though, so I wonder if
       | will work for any device? Perhaps it will work better on Android
       | but can be implemented for other devices?
        
         | judge2020 wrote:
         | No. This is the fido2 / webauthn standard, where the device
         | itself generates new keys for each website and the device uses
         | these stored keys to perform public key authentication to log
         | into websites. For some ecosystems (namely iCloud Keychain) it
         | syncs these key pairs between devices.
         | 
         | They already have "sign in with google" which directly links
         | sites to your Google account. This is not that.
        
       | mdtancsa wrote:
       | It seems awfully trivial but in the context of a positive
       | security announcement
       | 
       | g.co/passkeys (my gut says, "what is this scam? I am not clicking
       | on that") https://myaccount.google.com/signinoptions/passkeys (my
       | gut says, "interesting, let me take a look")
        
       | nashashmi wrote:
       | So yahoo has had this for a while. yes ... Yahoo. What's wrong
       | with Google these days? They seem to be too focused.
       | 
       | BTW, passkey is the name for a password that is made using word
       | keys.
        
         | barkerja wrote:
         | Google has actually had this rolled out for some time. I've
         | been using a Passkey on my account for the better part of a
         | year. For whatever reason, they're just now announcing it.
        
           | nashashmi wrote:
           | Thanks for the info. I am upset I missed out on this.
        
       | insane_dreamer wrote:
       | the "end of the password" is like the "year of linux on the
       | desktop"
        
       | bwanab wrote:
       | And once again, with a Google Workspace (or whatever they call it
       | these days) account, "Passkeys aren't allowed on this account.
       | Contact your admin for help".
       | 
       | I am the admin. Doesn't appear there's any way to help.
        
         | arunc wrote:
         | It seems like passkey isn't available for Google Workspace yet.
         | (I'm a Google Workspace admin as well).
        
       | galaxyLogic wrote:
       | Does this basically means there is one "master password"?
        
       | segmondy wrote:
       | I'm still salty about this. Called it passkey too.
       | http://www.multipasskey.com/susdemo/. Built this 5-6yrs ago and
       | applied to YC. Crickets. Hope to see this take off, with my
       | approach I made it where you don't even need to "register", you
       | can go to a site and just have an account. I did the fingerprint,
       | face scan, PIN approach for more security, but my favorite was
       | NFC ring. Basically you have an NFC ring you wear on your finger.
       | That way if someone steals your phone or takes it, you are
       | protected. The entire thing uses a unique pub/pri keys for each
       | site. Keys are backed up by shamir secret sharing distributed
       | across your friends or providers you select. 100% of your keys
       | are encrypted so I the provider can't see it, recover it or be
       | forced to reveal it. Since each site has a key, one could do
       | interesting things. E2E encryption for apps where they can't be
       | forced to reveal a key. If you are using an App and want to send
       | someone a message, the app can fetch the person's pub key, then
       | an inbuilt editor outside of the App in our app will be used to
       | compose the message and encrypt it. That way the App provider
       | can't be forced to reveal the message, and they don't have keys
       | either. Pretty much control in the hands of the user. The same
       | approach can be used for a storage pod where you have a pod that
       | stores your data that you encrypt and control. This is a good
       | start, hopefully we can see the good ideas of this, AT protocol
       | (account portability), keybase, etc all start to bear fruit.
       | 
       | What I don't like bout Google doing this is that the big
       | providers use this to tether and lock you in to their platform.
       | The power of this shines when it's federated. So if you run a
       | site, you can provide security to your users without them needing
       | Google, FB, etc.
        
         | lxgr wrote:
         | > use this to tether and lock you in to their platform.
         | 
         | You could say this about Google's proprietary authenticator app
         | in the past, but now that they support Passkeys, arguably the
         | opposite is true.
         | 
         | Importantly, you can now (with FIDO CTAP 2.2 and tunnel
         | services [1]) use an out-of-platform Passkey to log into your
         | account cross-device, e.g. you can use an iOS Passkey to log
         | into an account on a Windows Chrome instance via QR/Bluetooth.
         | 
         | There's absolutely nothing stopping you from providing your own
         | implementation as long as it complies with the "hybrid
         | transports" part of FIDO CTAP 2.2.
         | 
         | [1] https://fidoalliance.org/specs/fido-v2.2-rd-20230321/fido-
         | cl...
        
           | sdfghswe wrote:
           | > You could say this about Google's proprietary authenticator
           | app in the past
           | 
           | There's many implementations of OTP. I've never used google's
           | and I've been fine.
        
           | michaelt wrote:
           | The article says "Instead, passkeys let users sign in to apps
           | and sites the same way they unlock their devices: with a
           | fingerprint, a face scan or a screen lock PIN."
           | 
           | Does that not rather imply that, if I log in with faceid on
           | an iphone, my login will be tied to my ability to faceid on
           | an iphone, and hence only available on iphones and macs?
           | 
           | As a user, that's sounding a lot like platform lock-in to me.
           | 
           | And as a developer, if I want a way for users to log in
           | without a password, and I don't mind that login mechanism
           | being reliant on the user's account with apple / google /
           | microsoft - wouldn't I just add a 'log in with apple / google
           | / microsoft' button to my login page?
        
             | kstrauser wrote:
             | Ever site I've accessed with a passkey lets you tie it to
             | an existing account with a username/password, Google login,
             | Apple login, iPhone, YubiKey, etc. I've not used a passkey
             | where that was the _only_ auth I could create on an
             | account.
        
             | lxgr wrote:
             | You can use your device passcode instead of FaceID.
        
             | howinteresting wrote:
             | What it _does_ imply is that if you store your passkeys on
             | Apple 's keychain, migrating to Android becomes that much
             | harder. (I assume that Google will provide an
             | implementation of passkeys on iOS when that becomes
             | available as an API, but it will be a cold day in hell
             | before Apple provides access to its keychain on Android.)
             | 
             | The solution is to not use Apple's keychain for passkeys
             | (and really not use Apple's proprietary services for
             | anything at all), but we can't depend on people to have
             | that foresight.
        
             | [deleted]
        
             | voxic11 wrote:
             | No passkeys are just normal private keys. You can store
             | those private keys in a particular platform's secure key
             | store which on phones can be decrypted/made usable when you
             | unlock the device. But there is nothing stopping you from
             | transferring these keys to a different device if you wish.
        
               | michaelt wrote:
               | So if I transfer a passkey to my Yubikey, which has a
               | single button and no pin, thus achieving 1-factor
               | authentication - is that undetectable to the website?
               | 
               | Because sources like [1] say that "A passkey can replace
               | a password and a second factor in a single step" and "a
               | biometric sensor (such as a fingerprint or facial
               | recognition), PIN, or pattern" - isn't there something in
               | the standard that ensures the second factor is
               | maintained?
               | 
               | [1] https://developers.google.com/identity/passkeys
        
               | Veliladon wrote:
               | You wouldn't transfer a passkey to your YubiKey. You
               | would enroll it as another device that can be used to
               | login. Like right now on my Google account I have an
               | iCloud passkey and a Windows Hello passkey since iCloud
               | can't sync a passkey to Windows (yet).
        
               | cookiengineer wrote:
               | So this is basically the same thing like ssh keys?
        
               | Veliladon wrote:
               | Exactly. But with some added security.
        
               | dotancohen wrote:
               | Hypothetical political journalist just lost both his
               | Yubikeys when his office and home were both targeted. He
               | still has an off-site backup of his passkey. How would
               | you envision this working?
        
               | dwattttt wrote:
               | I'm unfamiliar with the particulars of passkeys, but with
               | hardware tokens I've used before, you'd log in ASAP and
               | unenroll the keys you've lost custody of.
               | 
               | edit: spelling
        
               | tialaramex wrote:
               | _If_ the site insists on UV (User Verification) rather
               | than UP (User Presence) a device which has no way to
               | verify the user should reject that.
               | 
               |  _If_ your site insists on the device providing a broad
               | identifying signature (the specification says devices
               | classes identified this way ought to consist of 10k+
               | devices, and in most cases a manufacturer will just
               | identify particular models, like OK, this the model we
               | made in 2019-2021, now we 're re-tooling to make the
               | newer model lets give it a new identifier) _and_ the user
               | agrees (I always refuse if asked, the documentation
               | advises you just don 't bother asking) to provide this,
               | then you can see OK, it's a Yubikey Model 6J, I think
               | that's (delete as appropriate) fine / not fine. This is
               | obviously a large piece of extra maintenance work, hence
               | it's advised you should not do it.
        
               | lxgr wrote:
               | True, Passkeys are private keys at heart, but relying
               | parties can verify whether they are stored in software or
               | hardware by requesting/requiring authenticator
               | attestation when they are created.
        
               | dcow wrote:
               | And certain hardware from certain platform vendors
               | doesn't allow exfiltration of private key material.
               | Though I don't think _this_ can be specified by the
               | relying party so that 's how Apple stores all keys in
               | keychai. I sincerely hope it remains best practice for
               | relying parties to not require/use the platform
               | attestation feature to lock users onto "trusted"
               | platforms.
        
               | lxgr wrote:
               | Device binding can be required by relying parties! They
               | can just refuse to accept credentials without attestation
               | statements signed by a trusted party.
               | 
               | My government e-signature service does that: I can't even
               | use a Yubikey, ironically, because that's not "FIDO level
               | 2 certified". I had to buy a more or less completely
               | unknown brand instead (of which a government affiliate is
               | apparently the exclusive reseller in my country...)
        
               | howinteresting wrote:
               | How exactly would you transfer your iOS passkeys to
               | Android? Please provide an enumerated list of steps.
        
           | dcow wrote:
           | You're suggesting that using a tunnel service is the
           | recommended way to be a platform agnostic backend. But that
           | doesn't cover the scenario where your password manager is
           | running on the same device as the one where the user is
           | performing the login, and all the UX/UI refers to using a
           | phone to scan the QR code. I guess you could snag the QR code
           | using platform accessibility features, but that's a real
           | silly hack. Just let me advertise some mDNS service record
           | for "authenticator" and require me to advertise a pubkey and
           | let the user select/allow me once and remember the decision
           | until the pubkey changes so that I'm trusted backend without
           | the QR scanning rigamarole.
        
             | lxgr wrote:
             | > the scenario where your password manager is running on
             | the same device as the one where the user is performing the
             | login
             | 
             | Android will provide an API for that scenario (i.e. on-
             | device third-party authenticators) in the near future [1].
             | 
             | Hopefully, iOS will do the same.
             | 
             | [1]
             | https://developers.google.com/identity/passkeys/supported-
             | en...
        
               | dcow wrote:
               | Yes, I'm waiting patiently in the wings. Sadly when I
               | asked Apple's Passkey team about supporting this, they
               | said it wasn't on the roadmap (though they carefully
               | didn't say never, it still doesn't instill much hope).
               | Once this missing piece becomes a required part of the
               | standard, I'll stop holding my breath and get super
               | excited about passkeys.
        
           | onlypositive wrote:
           | Can I store the keys in bitwarden or am I stuck using google
           | chrome to access this or whatever Mozilla cooks up?
           | 
           | I can't rely on retaining access to my Google account for
           | logging into things.
        
             | lxgr wrote:
             | On Android, there will supposedly be an API for third-party
             | Passkey implementations soon:
             | https://developers.google.com/identity/passkeys/supported-
             | en...
             | 
             | 1Password has already announced their intention to use this
             | once ready. I really hope iOS will provide something
             | similar soon.
        
             | yepguy wrote:
             | Not now, but soon. Bitwarden's public statements over the
             | past year, and their acquisition of passwordless.dev, would
             | seem to indicate that they're working very hard on adding
             | passkey support.
        
         | Moneyyyyy wrote:
         | At least Google does those things as an open standard.
         | 
         | So it should be easy for everyone else to do their own.
        
         | CharlesW wrote:
         | > _What I don 't like bout Google doing this is that the big
         | providers use this to tether and lock you in to their
         | platform._
         | 
         | How so? I just created two passkeys for my Google account --
         | one for Chrome, and one for my Apple Keychain.
        
         | rdsnsca wrote:
         | Apple, Google and Microsoft are all supporting passkeys
         | 
         | https://developer.apple.com/passkeys/
         | 
         | https://arstechnica.com/information-technology/2022/10/passk...
        
           | blackhaz wrote:
           | class
           | ASAuthorizationSecurityKeyPublicKeyCredentialAssertionRequest
           | 
           | Now I'm wondering what's the longest class name out there...
        
             | guessmyname wrote:
             | > _Now I 'm wondering what's the longest class name out
             | there..._
             | 
             | The longest class names I remember are in the Java
             | Development Kit (JDK) version 1.6, under the Swing+Nimbus
             | namespace:                 com       +-sun         +-java
             | +-swing             +-plaf               +-nimbus
             | +-...                 +-InternalFrameInternalFrameTitlePane
             | InternalFrameTitlePaneCloseButtonPainter.java
             | +-InternalFrameInternalFrameTitlePaneInternalFrameTitlePane
             | CloseButtonWindowNotFocusedState.java                 +-Int
             | ernalFrameInternalFrameTitlePaneInternalFrameTitlePaneIconi
             | fyButtonPainter.java                 +-InternalFrameInterna
             | lFrameTitlePaneInternalFrameTitlePaneIconifyButtonWindowNot
             | FocusedState.java                 +-InternalFrameInternalFr
             | ameTitlePaneInternalFrameTitlePaneMaximizeButtonPainter.jav
             | a                 +-InternalFrameInternalFrameTitlePaneInte
             | rnalFrameTitlePaneMaximizeButtonWindowMaximizedState.java
             | +-InternalFrameInternalFrameTitlePaneInternalFrameTitlePane
             | MaximizeButtonWindowNotFocusedState.java                 +-
             | InternalFrameInternalFrameTitlePaneInternalFrameTitlePaneMe
             | nuButtonPainter.java                 +-InternalFrameInterna
             | lFrameTitlePaneInternalFrameTitlePaneMenuButtonWindowNotFoc
             | usedState.java
             | +-InternalFrameInternalFrameTitlePanePainter.java
             | +-InternalFrameInternalFrameTitlePaneWindowFocusedState.jav
             | a                 +-...
             | 
             | There were threads in 2012 about them:
             | 
             | * https://news.ycombinator.com/item?id=4549685
             | 
             | * https://news.ycombinator.com/item?id=4770861
             | 
             | Someone copied the code in this repository: https://github.
             | com/zxiaofan/JDK/tree/master/JDK1.6-Java%20SE...
        
         | judge2020 wrote:
         | > What I don't like bout Google doing this is that the big
         | providers use this to tether and lock you in to their platform.
         | 
         | This is the concern, but exporting passkeys to other ecosystems
         | seems like it'll come with time, even if via third-party tools
         | or like how browsers will prompt you to "import your
         | <passwords|passkeys>" upon setup.
        
           | krono wrote:
           | Call me a cynic but I'm convinced that won't be happening
           | anytime before critical mass adoption of these companies' own
           | solutions, and either defeated acceptance of this new norm or
           | abject incomprehension by whomever remains.
           | 
           | "All your base are belong to us"
        
             | dcow wrote:
             | I'm a cynic too, but I'll also be optimistic about
             | published statements. Goggle said they're committed to
             | supporting 3rd party passkeys when they announced android
             | support. Apple, not so much though. I am hoping Google just
             | does the right thing and makes this table stakes.
        
             | booi wrote:
             | Yeah I fail to see why google would be incentivized to
             | provide this functionality.
        
               | gowld wrote:
               | EU provides incentive.
        
               | [deleted]
        
               | dotancohen wrote:
               | To which law are you referring?
        
               | tick_tock_tick wrote:
               | I think they are referring to the EU's aggressive data
               | surveillance and zero expectation of privacy to
               | government organizations. While the EU has been very pro
               | customer to business privacy they are vehemently against
               | anything that lets anyone hid anything them the
               | government.
        
         | EthanHeilman wrote:
         | MPK is really cool.
         | 
         | > What I don't like bout Google doing this is that the big
         | providers use this to tether and lock you in to their platform.
         | The power of this shines when it's federated. So if you run a
         | site, you can provide security to your users without them
         | needing Google, FB, etc.
         | 
         | The value of many of these schemes is authenticating under your
         | google/FB identity (email, phone number, org affiliations). It
         | makes a lot of sense for centralized identity providers to do
         | this because they already know who you are and how to
         | authenticate you.
         | 
         | There is a growing untapped market for the authentication and
         | secure use of of pseudonyms. For instance people that want to
         | run a blog and interact in social media under a name that is
         | not connected to their true name. Or some Senator wants to play
         | video games but might be worried that it looks frivolous. This
         | is a setting where something like MPK really shines. I believe
         | over the next five years we will see an ecosystem around a
         | pseudonymous web. MPK might have just been too early as that
         | ecosystem isn't quite here yet.
        
         | djbusby wrote:
         | I love this approach.
        
         | mawise wrote:
         | What you describe sounds awesome. Is it still something people
         | could use? If the WebAuthn protocol gains broader support
         | because Google/Apple are pushing passkeys then anything that
         | speaks WebAuthn should be a viable option, right?
         | 
         | Disclaimer: I own 2 NFC rings :)
        
         | EGreg wrote:
         | Contact me and let's add it to https://qbix.com/platform and
         | ecosystem so it is not captured by Big Tech corporations.
         | 
         | We have a lot to talk about and exchange information.
         | 
         | greg at the domain qbix.com
        
           | gowld wrote:
           | > greg at the domain qbix.com
           | 
           | I regret to inform you that someone has carelessly or
           | maliciously leaked your deobfuscated email address, on the
           | site
           | 
           | https://qbix.com/resume.html
        
         | hdiehdis wrote:
         | i say this every time this is mentioned... all these thing are
         | mostly to help advertisers and fight spam and reduce cost on
         | their servers.
         | 
         | theres a million ways to provide this functionality without
         | relying on vendor lock in. they are pretty much working as a
         | mini certificate authority/vendor.
         | 
         | instead of vetting clients and giving them CAs, they just run
         | your credit card for some hardware or subscription, and
         | validate your login.
        
           | pphysch wrote:
           | > theres a million ways to provide this functionality without
           | relying on vendor lock in. they are pretty much working as a
           | mini certificate authority/vendor.
           | 
           | Identity systems aren't too technically difficult, the
           | challenge is properly rolling them out and getting mass
           | adoption. Which means getting vendors/users on board. It's a
           | problem solved by power and politics, not technological
           | innovation.
        
             | sparkie wrote:
             | I recall Mozilla tried something similar around a decade
             | ago, which was a good solution but didn't get any adoption.
             | There's also been approaches like OpenID which were once
             | popular, where you can have a single login, but they have
             | the problem of third-parties aggregating the sites you
             | visit. Who uses OpenID today? It's all been replaced by
             | facebook or google login.
             | 
             | Part of the difficulty of using secure credentials is
             | sharing them between devices. It's easier to involve a
             | third-party like Google who can do this for you. The big-
             | tech doesn't actually want to solve the problem entirely
             | because they want some form of control: Either locking you
             | into their service, or aggregating the sites you log into,
             | or both.
             | 
             | They also want your biometrics, and keep pushing the
             | narrative that biometrics are for authentication, but
             | biometrics should only represent identity, not authority.
        
               | pphysch wrote:
               | > They also want your biometrics, and keep pushing the
               | narrative that biometrics are for authentication, but
               | biometrics should only represent identity, not authority.
               | 
               | What does "authority" mean here?
        
         | fersarr wrote:
         | Cool idea about the NFC ring. Is there anything like that now?
         | Any application?
        
         | witcH wrote:
         | https://www.tokenring.com/
        
         | r00fus wrote:
         | > What I don't like bout Google doing this is that the big
         | providers use this to tether and lock you in to their platform.
         | 
         | This is not what they want. They want to a) ensure
         | passwords/accounts aren't being shared to ensure a single
         | account is tied to a single user. They want this for all apps
         | so they can recognize revenue for every user. b) They want more
         | information on you as a user (as opposed to your family member
         | on the same account). The wet dream is per-device, per-user
         | profiles. Possibly even different [additional] costs for each
         | attached device.
         | 
         | That is their goal. Big Tech all want this. That it increase
         | friction to migrate is a side benefit (honestly not so much
         | more than with passwords now). That it happens to benefit users
         | is the lure to draw you in.
        
           | donalhunt wrote:
           | I think it's simpler than that. Expenditure is linked to
           | trust. Companies and platforms that erode trust, make less
           | money in the long run - they have to continually exert energy
           | to attract customers. Companies / platforms that focus on
           | building and retaining your trust have to work less hard to
           | have you part with your money.
        
           | waboremo wrote:
           | Can you explain how passkeys explicitly reaches that end
           | goal, when all of that is already currently possible without
           | passkeys?
        
             | jamilton wrote:
             | You can share passwords easily, I don't think you can
             | trivially share passkeys.
        
       | NikolaNovak wrote:
       | Ignorant question:
       | 
       | Are Passkeys, at some level of abstraction, permanently replacing
       | "something you know" (password) with "something you have"?
       | 
       | If I am in some kind of calamity (dropped my phone, got robbed,
       | etc), and I come to a friendly person's house, it sounds to me
       | like I simply would not be able to login to potentially critical
       | services, no matter how much I _know_ , because I don't _have_
       | anything (the device that passkeys are tied to  / on).
       | 
       | Is that true?
       | 
       | And... am I the only person completely dreading this system?
       | 
       | I don't live on my one and only phone; I have two phones, 3-4
       | tablets, 4-5 computers I use regularly. Of various operating
       | systems, browsers, manufacturers, etc.
       | 
       | I can create a password of arbitrary complexity and security and
       | comfortably use all my devices as well as any new device that
       | comes my way.
       | 
       | Passkeys sound... like a nightmare?
       | 
       | (they also sound AMAZING to my wife and family... woohoo no
       | passwords, I just have to use my phone... until they _INEVITABLY_
       | lose or break their phone... and then they 'll come to me and I
       | have no idea what to tell them anymore -- all your passkeys were
       | on your device and now they're gone forever because Google &
       | Apple decided it was better for you, and you did not follow
       | obscure methods I frankly cannot help or explain to you to maybe
       | possibly back them up, one day, when method exists, to some other
       | device)
        
         | dcow wrote:
         | I like to explain it like this:
         | 
         | If you use a password manager today, then you're already
         | essentially using something you have, because you need to be in
         | possession of your login database to retrieve passwords, and
         | nobody can remember that in their head.
         | 
         | Passkeys is a formalization of the idea that you should be
         | using a password manager where all the passwords are random
         | uncrackable 32 character strings, and if we add this constraint
         | then we can crazy secure things like employ _asymmetric crypto_
         | to prevent phishing and MITM attacks, so woO!.
         | 
         | You are right to be concerned about the whole device thing
         | though. Apple addresses this by requiring that you use/enable
         | iCloud keychain in order to use passkeys. The generalized
         | solution to this is allowing 3rd parties to be your passkey
         | provider, so that you can choose how your passkeys are stored
         | (cloud synced vs device bound) and e.g. whether you want an
         | implementation where you can unlock them with one strong
         | something you know, something you are, something your have, or
         | any combination thereof, the only limit being the
         | features/options the different 3rd party products will offer,
         | depending on their target market, etc.
        
           | JohnFen wrote:
           | > The generalized solution to this is allowing 3rd parties to
           | be your passkey provider, so that you can choose how your
           | passkeys are stored
           | 
           | The password manager I use has no cloud component (which is
           | why I chose it), and addresses this by allowing me to export
           | my password collection to an encrypted backup file.
           | 
           | Would this be a thing that the passkey folks would be OK
           | with? That would ease a lot of my hesitation.
        
         | lll-o-lll wrote:
         | Yes, it replaces something you know with something you have and
         | something you are. The hypothetical scenario you describe is a
         | downside.
         | 
         | As to your other concerns. Registering a passkey from each of
         | your devices should be a trivial exercise. If you want to play
         | with this now, GitHub has good integration (you can keep your
         | password, the passkeys you register are just alternative ways
         | to access).
         | 
         | For your family, your concerns are not warranted because the
         | "cloud backup" is part of the integration. With Apple, as an
         | example, the passkeys are tied to your keychain, and changing
         | devices/disaster recovery is relatively trivial. The passkeys
         | are also accessible from all your Apple devices, so you don't
         | have to create separate ones.
        
         | aimor wrote:
         | "And... am I the only person completely dreading this system?
         | Passkeys sound... like a nightmare?"
         | 
         | It's already a bad dream for me. I can't stand all the 6-digit
         | code I have to fetch to do things like: check email, schedule
         | appointments, pay bills, just plain buy stuff. I'm glad we're
         | long past the days of emailing users forgotten passwords in
         | plaintext, but I'd prefer to accept less security for the
         | convenience of being able to log into an account without
         | proving my identity via phone.
        
       | tomrod wrote:
       | Biometrics are not passwords. They are user IDs. I have concerns
       | with this approach.
       | 
       | EDIT: Looks like support will be coming to NordPass and other
       | password managers soon - https://support.nordpass.com/hc/en-
       | us/articles/1298467820264...
        
       | mdswanson wrote:
       | Is it just me, or does every "what is a passkey" definition never
       | actually define what passkeys are?
        
       | Nextgrid wrote:
       | How do you handle delegation in this case? Let's say I want to
       | delegate access to my account to a partner/friend/employee on a
       | service that doesn't support multiple users per account, charges
       | extra for it or outright doesn't want me to delegate access to
       | someone else (so it's not always possible to rely on the
       | website's cooperation).
       | 
       | Currently I can just message them the password or even write it
       | down on a post-it note and they'll have everything they need to
       | complete the task as me. How does it work with passkeys? Does the
       | spec allow my passkey HSM to securely share the secret by
       | encrypting it against the recipient's passkey HSM? Can it use the
       | concept of leaf certificates to sign a short-lived certificate
       | allowing access to that credential without sharing the
       | credential's secret itself?
       | 
       | I can't advocate for passkeys until the concerns above are
       | resolved. The push for passkeys seems like yet another attempt to
       | remove control from the user.
        
         | arnarbi wrote:
         | You can create a passkey for your account on their device, e.g.
         | by selecting "Use another device" when creating it, and
         | scanning the QR with their phone (their phone does not need to
         | be signed in to your account).
         | 
         | And if you both use iOS, you can Airdrop a passkey:
         | https://support.apple.com/guide/iphone/share-passkeys-passwo...
        
         | jmbwell wrote:
         | The accounts and services I use that support passkeys also
         | support some form of account delegation, recovery contacts,
         | legacy contacts, or family sharing. This includes Apple,
         | Google, Microsoft, and self-hosted services through Authentik,
         | Authelia, and Keycloak.
         | 
         | My experience is not necessarily representative, but I am not
         | sure how big the issue you describe would be, in practice, for
         | the majority of users, who will be, by and large, using one of
         | these services.
         | 
         | What is clearly a major issue for the majority of users is
         | unauthorized account access and resource theft through the use
         | of easily-phished account credentials protected by nothing more
         | than a character string being passed around in text messages
         | and sticky notes.
        
           | riversflow wrote:
           | > What is clearly a major issue for the majority of users is
           | unauthorized account access and resource theft through the
           | use of easily-phished account credentials protected by
           | nothing more than a character string
           | 
           | Is this a major issue though? I think it's pretty minor, not
           | being able to share or backup my passwords is a pretty huge
           | issue in my books.
        
         | kevincox wrote:
         | This is what I love about passwords. They are tangable and
         | understandable. I would have loved if we could move towards a
         | solution that has the benefits of passkeys (prevents phishing,
         | strong secret, doesn't seen the secret to the server) without
         | ditching the underlying secret being a somewhat human-readable
         | password. It seems that in-browser password-managers get us 99%
         | of the way there. I would have loved to do something like
         | adding a PAKE system to regular passwords rather than a new
         | system built on top of non-human readable keys.
         | 
         | I'm sure we will gain the ability to dump the key to a file or
         | write down onto paper at some point but it seems that we are
         | starting from the wrong end.
        
           | jmbwell wrote:
           | Also tangible and understandable is a registry of users who
           | have access to your accounts, that allows you to grant and
           | revoke access (at possibly different levels), without having
           | to reset all your own credentials.
           | 
           | I've got to quit commenting, but humans are undeniably the
           | weakest link in security. While I understand the perceptions
           | and even share some of the concerns expressed in this thread
           | about the loss of control, reverting to a human-readable
           | string as a key would only regress the whole scheme to
           | something that is, once again, as easily compromised as a
           | system protected only by any other human readable string.
           | 
           | We just have to cultivate new habits. Enroll multiple keys or
           | devices. Print the backup codes and put them in the fire safe
           | with your birth certificate. Give trusted friends and family
           | access to recover your account in the event you lose the
           | credentials or get hit by a bus. It's a few extra steps up
           | front, but once it's working, it's so much easier.
           | 
           | Honestly, there are so many people who never have any idea
           | what their password is, so they end up resetting it all the
           | time... passkeys is a net-positive. Now they don't even have
           | to remember anything.
        
             | kevincox wrote:
             | > It's a few extra steps up front, but once it's working,
             | it's so much easier.
             | 
             | It's a few extra steps _per site_. Every time you get a new
             | device you need to go back to every site you 've ever
             | visited and update the credentials. It is maybe feasible
             | for a few important accounts but it doesn't scale.
             | 
             | Whatever solution we have needs to be syncable and able to
             | be exported to a safe _once_ and continue to be usable by
             | new sites and devices into the future. People aren 't going
             | to print out their credential list every month to update
             | the fire safe.
        
               | jmbwell wrote:
               | The now-unfortunately-named "Password managers" help with
               | this by providing various mechanisms to sync keys with
               | multiple devices, so that every time you get a new
               | device, you simply need to authenticate and transfer the
               | key store to the new device.
               | 
               | The device's hardware security facilities are there to
               | protect the keystore. They aren't /the/ keystore.
               | 
               | Find a key manager. iCloud Keychain, Microsoft
               | Authenticator, Bitwarden, something. Use that. Concerns
               | about migrating devices dissolve away.
        
       | JoshTko wrote:
       | One weakness with passkeys is that a person can't login to an
       | account with just information that they know. I.e. they need a
       | authorised device. Given that devices can be lost, it seems that
       | folks that only own one device should not use Passkeys. Most
       | passkey users should probably have a minimum of three biometric
       | enabled - authorized personal devices if they want to use
       | passkeys. This might be the biggest roadblock to adoption as few
       | have this many personal devices.
        
         | shortcake27 wrote:
         | The goal from all vendors is absolutely to have passkeys backed
         | up to the cloud. In fact, passkeys on iOS required iCloud
         | Keychain to be enabled. Then the only issue is reauthorisation
         | with the vendor when the only trusted device is lost. It would
         | be surprising if vendors didn't cater for this scenario.
        
       | Lacerda69 wrote:
       | passkeys wont be the end of passwords:
       | https://www.ory.sh/overview-login-password-passkey-webauthn-...
        
       | red_trumpet wrote:
       | > passkeys are resistant to online attacks like phishing, making
       | them more secure than things like SMS one-time codes.
       | 
       | What is the scenario in which SMS one-time codes are prone to
       | fishing, but passkeys are not?
        
         | neilalexander wrote:
         | https://en.wikipedia.org/wiki/SIM_swap_scam
        
           | red_trumpet wrote:
           | Yeah okay, but then just don't do 2fa via SMS. How are
           | passkeys better than a 2fa app on my smartphone?
        
           | jefftk wrote:
           | That is also an issue with 2fa sms, but it's not phishing.
        
             | neilalexander wrote:
             | Phishing is quite often how a SIM swap attack starts.
        
         | wepple wrote:
         | Passkeys sign a web origin. If you try to phish one, the token
         | you get won't be valid for the origin you're trying to
         | authenticate to.
         | 
         | Eg you'll get:
         | 
         | Token{domain:hax0r.net username:bob}
        
         | jefftk wrote:
         | 1. You're tricked into visiting evil.example and don't realize
         | it.
         | 
         | 2. evil.example: confirm 2fa code to log in.
         | 
         | 3. evil.example starts logging into good.example as you,
         | triggering good.example to send the 2fa code.
         | 
         | 4. You see the 2fa code and enter it into evil.example.
         | 
         | 5. evil.example has phished your 2fa code.
         | 
         | This doesn't work with passkeys (or 2fa tokens) because those
         | verify the domain matches.
        
           | red_trumpet wrote:
           | Yes, I understand how phishing with 2fa works. But to me,
           | passkeys sound like 2fa with your fingerprint/smartphone PIN?
           | What's actually different there?
        
             | jefftk wrote:
             | The difference is in step 4. With SMS or one-time code 2FA
             | (or passwords) you're just entering text into a website,
             | and nothing verifies you're interacting with the right
             | website. With passkeys or FIDO tokens, though, there's a
             | cryptographic protocol that considers the domain: your
             | fingerprint/PIN isn't sent to the website.
        
               | red_trumpet wrote:
               | So, evil.example tries to log in and triggers the passkey
               | thing on my smartphone. My smartphone asks "Do you want
               | to log in to good.example?" Because I'm currently being
               | phished and didn't pay attention to the URL
               | "evil.example" anyway, I will confirm this on my
               | smartphone and evil.example is granted access to my
               | account. I don't see how this is more phishing resistant
               | than current 2fa. How can my smartphone know whether I'm
               | interacting with the correct website on my laptop?
        
               | jefftk wrote:
               | This is maybe an oversimplification, but the token that
               | your phone gives your laptop includes "only valid for
               | good.example". Your browser on your laptop then knows not
               | to send it to evil.example.
        
               | friedhelm2000 wrote:
               | [dead]
        
               | waldemar69 wrote:
               | [dead]
        
               | vorfahrt74 wrote:
               | [dead]
        
               | canislupus wrote:
               | [dead]
        
       | iLoveOncall wrote:
       | > Instead, passkeys let users sign in to apps and sites the same
       | way they unlock their devices: with a fingerprint, a face scan or
       | a screen lock PIN.
       | 
       | So, for the vast majority that does not have hardware that
       | supports fingerprint reading or face-scanning, this grand new
       | alternative to passwords is... passwords?
       | 
       | I get that it's nice for phones, but that's only about 50% of the
       | web's traffic.
        
         | Scion9066 wrote:
         | If you don't use biometrics then it's passwords or passcodes to
         | authenticate to the local device or a secondary device to
         | unlock it. After that it uses public key cryptography to do the
         | actual authentication with the site you're trying to log into.
         | At no point does the site need to have access to anything
         | secret, unlike traditional passwords.
        
       | ssss11 wrote:
       | If I choose the screen lock PIN example (instead of face scan or
       | finger print) why/how is that more secure and less resistant to
       | attack than a password?
       | 
       | It's a 4 digit number. What am I missing behind the scenes that
       | makes it more secure?
        
       | albybisy wrote:
       | the only thing that i don't like about login with passkeys is
       | that i need to turn on the bluetooth.
        
       | rainworld wrote:
       | See also https://passkeys.directory
        
       | 0xbadcafebee wrote:
       | This is a good start, but like everything Google introduces, it's
       | only designed to be useful to Google, and has a number of flaws:
       | 
       | - syncs to the cloud without E2E encrypted. there's no reason any
       | person should ever put all their private keys somewhere they can
       | be stolen without at least a secret master password protecting
       | them.
       | 
       | - they're not one standard. web apps will use WebAuthN, non-web
       | apps will use a FIDO API. Passkeys are a mix of different
       | technologies that is more complex than needed.
       | 
       | - they aren't interoperable with different software and devices.
       | Currently, if you make a passkey, it can only work with whatever
       | you used to make it. trying to use a passkey on different
       | operating systems or apps etc requires manual workarounds,
       | exporting/importing, etc.
       | 
       | - different providers have different levels of support. some
       | support sign-in, some support MFA, some support both.
       | 
       | - the choice of only being able to use biometrics or a pin to
       | protect the passkey store is stupid. you should be able to enter
       | in text as well, so you can use a long and complex key to protect
       | it, if you want. instead your options are 3 incredibly easy to
       | crack methods.
       | 
       | - there isn't an easy way to back up everything offline in case
       | your devices get lost.
       | 
       | - all this doesn't address attacks on account recovery, which is
       | the most common way to compromise an account (nobody brute-forces
       | passwords anymore, with the exception of giant password
       | compromises which are used for lateral attacks against other
       | services)
        
       | nilsbunger wrote:
       | How do you do account recovery if you run a service using
       | passkeys?
       | 
       | 1. email-based "reset passkey" flow -- only as secure as the
       | email it's sent to, and you need to make sure the email is still
       | valid since the user isn't using it regularly as part of their
       | auth.
       | 
       | 2. multi-factor "reset passkey" flow -- you have to make sure the
       | user has kept multiple factors (eg backup codes) which they're
       | mostly not using.
       | 
       | Is there something better? Anyone have a good resource?
        
       | dblitt wrote:
       | I still don't understand how the QR code flow works with
       | using/creating passkeys on other devices. It seems it uses a
       | bluetooth connection to your phone, but I can't find much
       | documentation about the exact protocol
        
         | sebk wrote:
         | It's called hybrid transport, and the old name for it was
         | caBLE. Yubico has a nice explainer here:
         | https://developers.yubico.com/WebAuthn/Concepts/Hybrid_Flows...
         | It's not fundamentally different than other transports for
         | other roaming authenticators like a USB key; the QR code sets
         | up a BLE connection between both devices and presents the
         | authenticator with a challenge for it to sign and log in the
         | originating device.
        
       | ghancock wrote:
       | I wrote about my experience with passkey support on other
       | services here: https://news.ycombinator.com/item?id=35758918.
       | That experience was mostly negative. For anyone implementing
       | this, the user experience matters and requires usability testing
       | of a lot of combinations.
       | 
       | In comparison to those, Google's support seems better. It worked,
       | was transparent about what was going on, and gave me the option
       | to create the key on either the device I was using or another one
       | if I wanted. The one hitch was that when I already had a 2FA key
       | on the same platform authenticator, it just said I already had a
       | registered key on this device and didn't do anything. I would
       | have expected some sort of upgrade flow for people who previously
       | registered their devices for 2FA, or at least to more directly
       | tell me to delete the existing security key on the device (which
       | is what I did, and which worked).
        
         | judge2020 wrote:
         | > it just said I already had a registered key on this device
         | 
         | Is this Android? Because, before this change, there was no way
         | to register a real WebAuthn-based passkey with Google, at least
         | when I was trying with chrome (it did not prompt the webauthn
         | popup, just the OS-native security key popup).
        
           | ghancock wrote:
           | This was on an iPad. My experience before had been that I was
           | able to register an iCloud passkey for Google 2SV when using
           | Safari on iOS/iPadOS, but I was unable with Chrome.
           | 
           | At that time, I inspected the registration request Google
           | sent to Chrome and found it was passing a private option that
           | Chrome recognized. According to what I found in web searches
           | for it, the option created a legacy U2F key, and they needed
           | to do that because there were existing Android devices that
           | they could not upgrade and that would not support log-in with
           | WebAuthn keys.
        
       | dpedu wrote:
       | No thanks. I trust google to a degree, but not that far.
        
       | TulliusCicero wrote:
       | Hmm, can I use these passkeys with Brave or other Chromium-based
       | browsers?
        
       | eikenberry wrote:
       | I'm curious how free software users will be able to take
       | advantage of this improved security. Seems tied pretty tightly to
       | proprietary systems and I wonder if, as a free software user,
       | I'll eventually be locked out of the Google ecosystem.
        
       | 015a wrote:
       | I'm curious to get a take on Apple's documentation for passkeys
       | and iCloud Keychain Recovery Escrow system [1] [2]
       | 
       | There's multiple references in this documentation to phrases like
       | "To sign in for the first time on any new device, two pieces of
       | information are required--the Apple ID password and a six-digit
       | verification code" or in the no-device-recovery escrow
       | documentation: "users must authenticate with their iCloud account
       | and password"
       | 
       | I can imagine a world where Apple replaces sign-in passwords with
       | passkeys; your devices form a ring of trust which "sponsor" new
       | devices into your end-to-end-encrypted iCloud Keychain. But I'm
       | having a hard time imagining how zero-device escrow recovery can
       | work without a thing-you-know password.
       | 
       | Has Apple spoken specifically on this at all? Do they intend to
       | follow the same route as Google and get rid of passwords
       | entirely, and if so how are they securing zero-device iCloud
       | Keychain recovery? Or will they probably just keep passwords
       | around, if only for this specific use-case; and if so, what are
       | the implications for functional user security? If I have an Apple
       | Password I don't use for ten years, then have to use it that one
       | time to complete zero-device recovery, many users won't remember
       | it.
       | 
       | [1] https://support.apple.com/en-us/HT213305
       | 
       | [2] https://support.apple.com/guide/security/escrow-security-
       | for...
        
         | philistine wrote:
         | My presumption has been that they will force a long recovery
         | key to be printed by you for recovery OR the enrollment of
         | designated trusted users that can approve an account recovery.
         | 
         | They already force you to do either of those things if you want
         | end-to-end encryption for all content types (which they called
         | increased data protection).
        
       | zug_zug wrote:
       | What are the privacy implications for this? Are companies that
       | see my passkey going to be able to link it to all my other
       | accounts, or will each passkey be completely anonymous?
        
         | echeese wrote:
         | Passkeys are unique per Relying Party, in this case, google.com
         | can only access passkeys for google.com. They can't even
         | enumerate them, all they can do is pop up a dialog and wait for
         | the user to select one.
        
       | lxgr wrote:
       | WebAuthN is great, but I can't help but feel that Passkeys are
       | actually a step backwards.
       | 
       | At least on iOS, there is no way of preventing them from being
       | synced to iCloud, which is the opposite of what I want for high-
       | stakes credentials like bank accounts or government e-signatures.
       | 
       | I've tried to raise [1] a related issue (i.e. the inability for
       | relying parties to opt out of credential syncing, if not an
       | explicit requirement to opt in to it) to the W3C WebAuthN working
       | group, but it seems like the working group itself is strongly pro
       | cloud synchronization as well.
       | 
       | Today, Google has sent me an email about their intention to
       | deprecate their (device-bound) iOS authenticator in favor of
       | (iCloud-synchronized) Passkeys, and I guess I'll begrudgingly
       | have to switch to using an external FIDO authenticator instead.
       | 
       | [1] https://github.com/w3c/webauthn/issues/1714
        
         | sneak wrote:
         | You can't even use Passkeys on iOS without using iCloud; if you
         | opt out of iCloud, Passkeys are disabled.
        
           | lxgr wrote:
           | Apparently so; I just saw that as well (and edited my post).
           | Bizarre.
           | 
           | Between that and completely removing anonymous attestation
           | (i.e. implicit device binding), it makes me wonder what
           | Apple's motives here really are...
        
         | signal11 wrote:
         | My cynical assessment of Passkeys is:
         | 
         | If Google/Amazon/Apple/Meta/whoever locks your account out, you
         | now lose access everywhere.
         | 
         | This isn't a theoretical risk. You'll see lots of people
         | complain about this online.
         | 
         | Also, Passkey providers now get sweet sweet metadata about your
         | accounts around the web.
         | 
         | But yeah, authn is hard to do right. Equally, asking your users
         | to fall into $BIG_PROVIDER's arms seems wrong.
         | 
         | My personal hope is that various _accountable_ nonprofits will
         | begin to offer passkeys.
        
           | [deleted]
        
           | skybrian wrote:
           | I don't know about privacy, but the lockout risk doesn't seem
           | worse than losing your phone or Yubikey. You should have
           | multiple independent ways to log in for any account you care
           | about. Passkey will be one way.
           | 
           | Possibly two ways, if you have both Android and iOS devices
           | and you register both? (I assume Android and iOS remain
           | independent.)
        
             | clnq wrote:
             | What if one loses all their devices in a natural disaster,
             | a house fire, or burglary, or lost baggage while traveling?
             | 
             | A password is in your head. If you lose that, there's not
             | much use for the said password. But otherwise, it's secure.
             | And it's pretty secure from an infosec perspective if it's
             | a passphrase.
        
             | dotancohen wrote:
             | So if passkey is just yet another way to log in, then all
             | the security aspects are moot, no? The attacker could still
             | attack the other login methods. E.g., even if the passkey
             | is a secure surface, it does not replace the insecure
             | attack surfaces.
        
               | pas wrote:
               | ideally the site requires 2FA for those, or sends a
               | confirmation email and makes you wait a few hours, etc.
        
           | hedora wrote:
           | Agreed. This whole thing seems incredibly user hostile. At
           | the very least, there should be severe legal recourse
           | (criminal liability and also large, material-to-earnings
           | statutory damages) if one of these providers intentionally
           | locks you out of a third-party account.
           | 
           | That third party account should be treated like your personal
           | property, and them denying you access to it should be treated
           | like their CEO breaking into your house and stealing your
           | stuff.
           | 
           | If they don't want to take on the liability, and it kills the
           | passkey spec, that's fine with me. The current system avoids
           | the issue by allowing people to store credentials in a
           | decentralized way.
        
           | lxgr wrote:
           | > If Google/Amazon/Apple/Meta/whoever locks your account out,
           | you now lose access everywhere.
           | 
           | Fortunately, both iOS and Android also support "detachable
           | passkeys" a.k.a. Yubikey and co. ("roaming authenticators" in
           | WebAuthN/FIDO parlance).
           | 
           | Unfortunately, only Android is planning to offer [1] a first-
           | party Passkey provider API, because that's what I'll probably
           | be using 99% of the time (finding my external authenticator
           | for every login is frustrating).
           | 
           | > Also, Passkey providers now get sweet sweet metadata about
           | your accounts around the web.
           | 
           | To my knowledge, both Google's (for Android) and Apple's sync
           | backends are end-to-end encrypted. I'm not sure if that
           | includes the metadata as well as the private keys, though.
           | 
           | [1]
           | https://developers.google.com/identity/passkeys/supported-
           | en...
        
             | signal11 wrote:
             | > Fortunately, both iOS and Android also support
             | "detachable passkeys" a.k.a. Yubikey and co
             | 
             | That's good to know.
             | 
             | Although my concern would be, that's really good for people
             | who use YubiKeys, but regular people won't, and they can
             | then get bitten by account lockouts.
             | 
             | Is there something regular users can do to use Passkeys
             | (let's say they use Google) _and_ have some recourse if
             | Google locks them out?
             | 
             | Also, what happens if they use Android, have no other
             | computing device (this is fairly common in some parts of
             | the world), and their phone gets stolen?
        
               | waboremo wrote:
               | Passkeys don't negate regular account recovery processes.
               | Just as if you were to lose your password, you would have
               | to talk to support.
        
           | clnq wrote:
           | Giving your passwords to a company that cares about money
           | more than you is risky. But losing devices with passkeys is a
           | big problem too. Even if passkeys are saved to your Google,
           | Apple, or Microsoft account, if that account itself is behind
           | a passkey, how do you access it if your phone holding the key
           | breaks? If a disaster or fire happens, all your devices could
           | be gone.
           | 
           | Passwords are good because you remember them in your head, so
           | long as the head works, so do the passwords. This might be an
           | obvious statement, but it's clear passkey providers kind of
           | glance over it.
        
         | wkat4242 wrote:
         | Personally I don't want to be dependent on a third party like
         | Google or Apple for my identity. That's never going to be
         | acceptable.
         | 
         | If they just accept normal Yubikeys (and multiple at a time for
         | redundancy) that'd work for me but this passkey stuff where the
         | vendor gets to decide things and I don't fully own my
         | credentials is just wrong IMO.
         | 
         | I wonder if there's a fully self hosted passkeys option?
         | 
         | I'm also opposed to attestation. With TOTP I can use any app I
         | want and back up my keys however I like. But Fido gives a lot
         | of control to websites, they can choose what kind of
         | authenticators or apps to accept. This can make it too easy to
         | get locked into vendor solutions because they are the only ones
         | every website trusts.
        
           | lxgr wrote:
           | > I wonder if there's a fully self hosted passkeys option?
           | 
           | If external authenticators work for you, physical keys (like
           | Yubikey, Solokey etc.) are arguably self-hosted!
           | 
           | For on-device passkeys, at least Android is preparing an API
           | for this [1]. I hope that iOS will follow at some point, as
           | well as Firefox (which unfortunately has been quite slow to
           | adopt all aspects of WebAuthN).
           | 
           | > I'm also opposed to attestation. With TOTP I can use any
           | app I want and back up my keys however I like.
           | 
           | In principle I agree, but some service providers like banks
           | are legally liable for fraud losses (at least in some
           | jurisdictions). I'd say they do have a legitimate interest of
           | being able to verify which authenticators they trust.
           | 
           | Of course, it's being already exploited in a pretty much
           | expected way: My government offers a (free to end-users, tax
           | paid) e-signature solution. They support, among other
           | authentication methods, FIDO - but only a very specific
           | authenticator, of which the e-signature service provider is
           | the exclusive reseller in the country...
           | 
           | [1]
           | https://developers.google.com/identity/passkeys/supported-
           | en...
        
             | wkat4242 wrote:
             | > If external authenticators work for you, physical keys
             | (like Yubikey, Solokey etc.) are arguably self-hosted!
             | 
             | Yes. And this is what I do with all my personal stuff
             | (though I use the GPG mode on the yubikey, not Fido2). But,
             | because a passkey can be backed up, websites targeting
             | mainly passkeys will be likely to offer only a single
             | authenticator to be enrolled. Of course with hardware
             | authenticators that is not going to work. Lose that one and
             | you're screwed. This is why multi-authenticator support is
             | so important.
             | 
             | > For on-device passkeys, at least Android is preparing an
             | API for this
             | 
             | Thanks, I'll have a look at that. I'd want it on the PC too
             | though (BSD). But anyway, hopefully it will come. I never
             | really looked at it, as for now the website acceptance part
             | is still so low that it didn't matter anyway. For the ones
             | I use regularly, only Office 365 supports it. I'm not
             | interested in the old FIDO MFA mode, only full passwordless
             | will do.
             | 
             | > Firefox (which unfortunately has been quite slow to adopt
             | all aspects of WebAuthN).
             | 
             | Yes, this is really a PITA now. They really don't seem to
             | give a ***, they only offer CTAP2 (full FIDO2 + PIN) mode
             | on Windows. Still not working on Mac, Linux, BSD... It's
             | been in this sorry state for _years_ now.
             | 
             | > In principle I agree, but some service providers like
             | banks are legally liable for fraud losses (at least in some
             | jurisdictions). I'd say they do have a legitimate interest
             | of being able to verify which authenticators they trust.
             | 
             | Banks here already use their own authenticators which they
             | provide anyway, but yeah that's a point. Many other sites
             | shouldn't be able to make such decisions though, IMO.
             | 
             | PS: I'm not sure why you are being downvoted, I really
             | appreciated your insightful comment. Especially about the
             | Android option I wasn't aware of.
        
         | AlexandrB wrote:
         | > Today, Google has sent me an email about their intention to
         | deprecate their (device-bound) iOS authenticator
         | 
         | Is this the TOTP authenticator app that Google only started
         | actively maintaining again in the last year or so? If that's
         | the case, that's pretty funny timing.
        
         | toomuchtodo wrote:
         | How is this different than a password manager with encrypted
         | cloud backup? Your recourse if someone breaks passkeys is
         | legal, not technical. Security must be a balance with
         | functionality, and this is a huge improvement over passwords.
         | (Tangentially, it would be great if we got cryptographic
         | digital identity cards like Estonia has for signatures but
         | that's more of a long term goal)
         | 
         | Cloud sync (encrypted!) is important because your average user
         | needs that convenience and durability of authenticator.
        
           | ris wrote:
           | > Tangentially, it would be great if we got cryptographic
           | digital identity cards like Estonia has for signatures but
           | that's more of a long term goal
           | 
           | Wonderful. Until every second web service starts to require a
           | signature from such digital identity ("age verification"
           | perhaps?) and that's the end of pseudonymity.
        
           | transpute wrote:
           | _> Cloud sync (encrypted!) is important because your average
           | user needs that convenience and durability of authenticator_
           | 
           | Local-only iOS+macOS Codebook sync (open-source encrypted! by
           | SQLCipher) provides password and TOTP convenience,
           | durability, transparency, decentralization and fewer supply
           | chain dependencies with one-time purchase. Founded in 2005.
           | 
           | https://www.zetetic.net/codebook
           | 
           | https://github.com/sqlcipher/sqlcipher
        
             | lxgr wrote:
             | > password and TOTP convenience
             | 
             | Passwords and TOTPs are not MITM-safe, WebAuthN/Passkeys
             | implicitly are. (Credentials are bound to a specific RP,
             | i.e. it's impossible to accidentally provide one to the
             | wrong website or a scammer on the phone.)
        
               | transpute wrote:
               | Codebook links passwords to specific websites/RPs. Some
               | people don't take phone calls from random callers.
               | 
               | Can Apple allow existing password managers like Codebook
               | to manage passkeys and synchronization locally?
        
               | lxgr wrote:
               | > Codebook links passwords to specific websites/RPs. Some
               | people don't take phone calls from random callers.
               | 
               | Sure, but passwords are still multiple-use, and sometimes
               | auto-fill fails (often due to websites actively messing
               | with it), requiring me to manually copy-paste the
               | password and exposing me to phishing risk, or that of
               | insecure/malicious applications on my system sniffing the
               | clipboard.
               | 
               | > Can Apple allow existing password managers like
               | Codebook to manage passkeys and synchronization locally?
               | 
               | Unfortunately not at the moment. There is some hope
               | though, given that Apple has recently added a TOTP API
               | for third-party authenticators, but I'm personally not
               | holding my breath.
        
               | transpute wrote:
               | _> sometimes auto-fill fails_
               | 
               | For those, Safari share sheet -> "Find in Codebook" =
               | dialog with URL-matched credentials appearing first.
               | 
               |  _> insecure /malicious applications on my system
               | sniffing the clipboard_
               | 
               | iOS now requires interactive user consent for apps to
               | Paste from clipboard.
        
               | lxgr wrote:
               | > iOS now requires interactive user consent for apps to
               | Paste from clipboard.
               | 
               | Fortunately it does - a big security win. But
               | unfortunately, macOS does not yet, and I'm copy-paste-ing
               | passwords there more often.
               | 
               | I'm often wondering if drag and drop of text is actually
               | more secure than the pasteboard?
        
           | lxgr wrote:
           | The difference is that I can choose my password manager on
           | iOS (and thereby pick my desired security level for password
           | synchronization or opt out of it completely), but not my
           | Passkey synchronization backend: iOS forces these to be
           | stored in iCloud Keychain. (Passkeys are unavailable without
           | iCloud Keychain [1]!)
           | 
           | Ideally, there would be a per-passkey UI option to opt out of
           | synchronization at creation time.
           | 
           | > Security must be a balance with functionality, and this is
           | a huge improvement over passwords.
           | 
           | Sure, but I'm somewhat disappointed that the WebAuthN WG
           | basically forced this huge change of semantics (it's
           | essentially a security vs. availability tradeoff) into
           | relying parties without explicitly collecting their opt-in
           | beforehand, or even providing an ergonomic way of opting out.
           | 
           | [1] https://support.apple.com/guide/iphone/sign-in-with-
           | passkeys...
        
             | toomuchtodo wrote:
             | I agree there should be a way to opt out of system level
             | ecosystem passkey sync with a big ol' "you're fucked if you
             | don't back these up somewhere" click through warning.
        
               | lxgr wrote:
               | That's exactly what I want, ideally at a per-passkey
               | level.
               | 
               | It should also be able for relying parties to express
               | that desire (whether opt-in or opt-out by default). As it
               | is, I think it'll just make banks and governments less
               | likely to adopt passkeys.
               | 
               | That's sad, because all in all I think WebAuthN has the
               | potential to have a very positive impact on security
               | globally.
        
             | admax88qqq wrote:
             | > The difference is that I can choose my password manager
             | on iOS
             | 
             | This is what you expect when you buy into the closed Apple
             | ecosystem.
        
               | lxgr wrote:
               | Yes, being able to choose my own password manager is
               | indeed an important feature to me. I'm pretty sure that
               | feature is not unique to closed platforms, though.
        
               | ilyt wrote:
               | You're _basically_ complaining that your choice of using
               | closed down platforms arrived with delay
        
             | stouset wrote:
             | Okay so use a YubiKey?
             | 
             | I must be missing something but I _do not get_ all this
             | hand-wringing. Don't like the passkey options from Google
             | or Apple? Fine! Use the hardware authenticator you
             | absolutely already have if you're the kind of person who
             | has these sorts of objections.
        
               | lxgr wrote:
               | Sure, I already do that, but why shouldn't there be a
               | choice in on-device passkey implementations just like
               | there is for password and HOTP/TOTP authenticators?
               | 
               | Your argument sounds a bit like "Don't like Safari? Just
               | use a different OS then" in the context of allowing
               | browser choice on iOS. There is no technical reason a
               | Passkey provider and OS/platform should be necessarily
               | bundled.
               | 
               | It would encourage competition in both functionality and
               | security, it reduces reliance on a single account your
               | entire digital life, it allows niche products to address
               | special requirements in all kinds of scenarios...
        
               | stouset wrote:
               | > Your argument sounds a bit like "Don't like Safari?
               | Just use a different OS then" in the context of allowing
               | browser choice on iOS.
               | 
               | Except... you can just use a YubiKey. It's closer to
               | saying "install Firefox" than "install a different OS".
               | 
               | > There is no technical reason a Passkey provider and
               | OS/platform should be necessarily bundled.
               | 
               | Sure, fine. This is like V1 of every provider's
               | implementation. None of this was even available three
               | months ago, I have no doubt these things are coming.
        
               | lxgr wrote:
               | > Except... you can just use a YubiKey. It's closer to
               | saying "install Firefox" than "install a different OS".
               | 
               | No, you're literally recommending I use a separate
               | physical device because there is no API to achieve the
               | same functionality that the OS provides via their bundled
               | implementation.
               | 
               | > Sure, fine. This is like V1 of every provider's
               | implementation. None of this was even available three
               | months ago, I have no doubt these things are coming.
               | 
               | On iOS, Passkeys have been available for more than half a
               | year now. I really hope that Apple will eventually follow
               | suit.
        
             | dcow wrote:
             | Yeah this is fair. It blows my mind that platform players
             | don't understand that the security posture needs to be
             | configurable at a per-credential level. The hope would be
             | that 3rd parties step in and provide implementations that
             | afford these options to users, but that would require
             | platform players to stop dragging their feet on allowing PW
             | managers to hook in to WebAuthN challenges as a credential
             | store/backend.
        
         | sebk wrote:
         | For the client-side, the spec is comprehensive in allowing the
         | authenticator to decide whether backups are allowed. In this
         | case it's iOS not exposing that to you as a user. I get why
         | you'd want this, but trusting Apple to store your single-device
         | passkeys for high-stakes credentials but not trusting them for
         | syncing them is somewhat of a very specific threat model I'd
         | say, and definitely not in Apple's own interest to support, to
         | your detriment.
         | 
         | RP-side, it's true that RPs can't opt out of credential
         | syncing, but I think that would be weak at best, as the
         | authenticator can do what it wants. The RP can use attestation
         | and the DPK extension to effectively bind authentications to
         | the same originating device.
        
           | lxgr wrote:
           | > trusting Apple to store your single-device passkeys for
           | high-stakes credentials but not trusting them for syncing
           | them is somewhat of a very specific threat model I'd say
           | 
           | I don't think it's that specific of a threat model, to be
           | honest.
           | 
           | Many people are logged into iCloud on multiple family devices
           | - are they aware that with Passkeys, by default every device
           | they are logged in to has single-factor access to their
           | entire online life?
           | 
           | Additionally, Apple's iCloud security posture has been in the
           | news lately with some quite horrible stories that are very
           | relevant to Passkeys, in my view:
           | https://www.wsj.com/articles/apple-iphone-security-theft-
           | pas...
        
       | mmcnickle wrote:
       | The linked security blog post[1] has a lot more of the technical
       | details and can clear up some of the questions/confusion that
       | people have added in the comments.
       | 
       | [1]https://security.googleblog.com/2023/05/so-long-passwords-
       | th...
        
         | garganzol wrote:
         | Those guys should not work in identity and access areas.
         | Period. Only one reason says everything: they provide no
         | support. Customers will be left in the cold, minus all their
         | belongings.
         | 
         | But they may separate into several companies to avoid conflict
         | of interests, if they prefer, this time with proper support and
         | everything. Or they can be forced to do so, if they are too
         | stubborn and will continue running their dystopian playbooks.
         | 
         | So, the situation is not strictly technical, it's much deeper
         | than that. A blog post won't make a dent.
        
         | wepple wrote:
         | +1 everyone should read that - 60% of comments on this thread
         | are explained away by reading this.
        
       | mihaaly wrote:
       | I will never weld my login to a physically so fragile and
       | unpredictably high maintenance and volatile thing as a mobile
       | phone. It is also cumbersome for casual logins and increadibly
       | risky for important ones. Thank you, but no.
       | 
       | (good thing I already started to migrate away from the Google
       | universe)
        
       | jrm4 wrote:
       | I'm glad most people here are recognizing that this is a stupid,
       | stupid idea.
       | 
       | Here is some simple old-school ammo against it (or perhaps in
       | favor of it, if they were to be so bold) Some good old-fashioned
       | "skin-in-the-game" e.g. Nassim Nicholas Taleb style.
       | 
       | I will gladly use (and pay for!) this, but only with
       | _indemnification._
       | 
       | Insure me to the tune of, say, $100,000 in the event of a breach
       | or a problem and not only will I use it, I'll pay for it.
       | 
       | Otherwise, no deal. If e.g. Google wouldn't take this theoretical
       | (or practical) deal, then they are completely full of it.
        
       | account-5 wrote:
       | Nope, passwords stay until passkeys aren't tied to a device that
       | can be lost, stolen, or broken. Or you need multiple devices to
       | avoid that. And they are offline and not controlled by
       | multinational corps only interested in monitoring everything you
       | do for profit.
        
       | Am4TIfIsER0ppos wrote:
       | fuck off and bring back smtp access!
        
       | CatWChainsaw wrote:
       | The technology of passwords has been around for millennia, never
       | perfect, not terrible enough to throw out wholesale. As I said
       | somewhere else, the democracy of authentication, the best of
       | several imperfect options. Certainly I'm not securing anything of
       | mine behind my phone (can be broken) or my face (can also be
       | broken) on a proprietary system under Google's fickle control,
       | when my brain is less likely to be broken (and if it's not, I'll
       | have much bigger problems to worry about than getting into my
       | accounts).
        
       | eulers_secret wrote:
       | I'm a Linux user. I don't have an android/iOS/macOS/Windows
       | machine.
       | 
       | Is there a solution? Is this being used to push Linux users off
       | the internet? Can I just fire up emulated Android and be ok?
       | 
       | Am I screwed? Googling indicates I am, indeed, screwed. Pretty
       | concerned about this future.
        
         | nmca wrote:
         | Yubikey is supported; which has linux compatibility.
        
       | vlovich123 wrote:
       | Let's say I have a passkey in Chrome and no password. How do I
       | add a passkey to iOS so that I can login via both mechanisms?
       | 
       | Is my understanding correct that if I only used Passkeys that I'd
       | be permanently locking my account to a third party service to the
       | vendor I used to login with in the first place?
        
         | domoritz wrote:
         | At least for the Google account, it looks like you can add
         | multiple passkeys.
        
           | vlovich123 wrote:
           | Sure. But am I still locking my ability to access that
           | account permanently to Google? Can I login via Chrome on an
           | Apple/Windows platform and add a passkey there?
           | 
           | I'm also a bit worried that this permanently entrenches these
           | as the platform vendors because no one is going to port to a
           | new platform unless you're already a major tech company
           | (maybe).
        
             | ytch wrote:
             | For Chrome on desktop OS, it will popup a QR code that you
             | can scan it by passkey-registered phone like[1].
             | 
             | If your desktop/laptop has TPM, TrustZone or other similar
             | devices, it can register Passkey too.
             | 
             | [1] https://9to5google.com/2022/10/12/android-chrome-
             | passkey-sup...
        
               | vlovich123 wrote:
               | That's interesting and I think potentially addresses the
               | concern. I don't think I've seen Apple have a QR scanning
               | code option for passcodes but it's possible that's just
               | integrated into normal QR in-camera. Apple doesn't have a
               | QR export does it?
               | 
               | What would be nicer if there's a way to do this in Chrome
               | on mobile. I'm not always near a computer although I'm
               | reality that's probably when I'd be adding the passkey
               | via chrome.
        
               | CharlesW wrote:
               | > _I don't think I've seen Apple have a QR scanning code
               | option for passcodes but it's possible that's just
               | integrated into normal QR in-camera._
               | 
               | Exactly -- I just did this, and it's that simple.
        
             | barkerja wrote:
             | Google actually outlines that very scenario near the bottom
             | of their announcement:
             | 
             | > Using passkeys does not mean that you have to use your
             | phone every time you sign in. If you use multiple devices,
             | e.g. a laptop, a PC or a tablet, you can create a passkey
             | for each one. In addition, some platforms securely back
             | your passkeys up and sync them to other devices you own.
             | For example, if you create a passkey on your iPhone, that
             | passkey will also be available on your other Apple devices
             | if they are signed in to the same iCloud account. This
             | protects you from being locked out of your account in case
             | you lose your devices, and makes it easier for you to
             | upgrade from one device to another.
             | 
             | > If you want to sign in on a new device for the first
             | time, or temporarily use someone else's device, you can use
             | a passkey stored on your phone to do so. On the new device,
             | you'd just select the option to "use a passkey from another
             | device" and follow the prompts. This does not automatically
             | transfer the passkey to the new device, it only uses your
             | phone's screen lock and proximity to approve a one-time
             | sign-in. If the new device supports storing its own
             | passkeys, we will ask separately if you want to create one
             | there.
        
               | kps wrote:
               | > If you want to sign in on a new device for the first
               | time, or temporarily use someone else's device, you can
               | use a passkey stored on your phone to do so.
               | 
               | No lock-in; you have _two_ phone OS vendors to choose
               | from!
        
               | alwaysbeconsing wrote:
               | > that passkey will also be available on your other Apple
               | devices if they are signed in to the same iCloud account
               | 
               | I am not sure I like this. Unless the passkeys are only
               | transferred directly device-to-device, each OS vendor's
               | user cloud storage now becomes the keys-to-every-kingdom
               | uber-target.
        
               | barkerja wrote:
               | If that is a concern of yours, there is an option on
               | Apple devices to disable iCloud syncing for
               | passwords/credentials. This would limit passkeys to
               | strictly device-only.
        
               | neilalexander wrote:
               | > For example, if you create a passkey on your iPhone,
               | that passkey will also be available on your other Apple
               | devices if they are signed in to the same iCloud account.
               | 
               | In addition to this, you can AirDrop a passkey from one
               | device to another, even if they don't belong to the same
               | iCloud account.
        
               | vlovich123 wrote:
               | All of that just locks you into Apple's platform and now
               | I have a problem copying that passkey to chrome.
               | 
               | However, a sibling commenter mentioned QR code
               | export/import. That would alleviate the concern and be
               | even more elegant, especially if it automatically created
               | a new passkey registration instead of just copying it
               | around.
        
               | judge2020 wrote:
               | AFAIK QR code export is not a thing, just speculation for
               | how passkey exports could work (which I doubt since QR
               | codes get hard to scan the more data you pack into them;
               | maybe you could ask the user to hold the camera to the
               | screen for a minute while the target machine cycles
               | through each passkey, or cycles through qr code data
               | itself to facilitate error correction and 100% data
               | transfers)
        
               | vlovich123 wrote:
               | Seems to be a thing on Android/Chrome:
               | 
               | https://news.ycombinator.com/threads?id=vlovich123#358025
               | 11
        
             | warkdarrior wrote:
             | You are confusing the location where passkeys are stored
             | (your Android, your iPhone, your Yubikey) and where they
             | can be used (to access your Gmail account).
        
               | alwaysbeconsing wrote:
               | I don't think they are; they're effectively asking
               | whether accounts will support multiple passkeys. This is
               | a reasonable question IMO: if the protocol is not well-
               | designed different services (account providers) may have
               | different rules about how many passkeys can be attached
               | to your account in their system. (E.g. "2 passkeys ought
               | to be enough for anybody!") And for how they can be
               | managed: removed and updated, particularly.
        
       | aboringusername wrote:
       | What are the legal implications of passkeys? Are there any case
       | law examples yet?
       | 
       | My understanding is it's 100% impossible to 'prove' I know a
       | password or not as it could be written on a piece of paper
       | somewhere, and it's entirely possible for that paper to be
       | shredded and therefore any proof of that password is gone,
       | forever. I remember hearing you cannot be compelled to hand over
       | a password.
       | 
       | Biometrics et al on the other hand? Could/would a judge compel
       | those to be disclosed? I saw a video of a police officer forcing
       | somebody to use their face to unlock their phone to delete a
       | video. With a password, this would be 100% impossible.
       | 
       | So yeah, think about that BEFORE using.
        
         | Scion9066 wrote:
         | You don't have to enable the biometric part of this as you can
         | still protect your device with a passcode/password only if you
         | want. I just tested it and was able to use it with just my
         | device PIN, no biometrics.
         | 
         | The part about not being able to be compelled to hand over a
         | password or decrypt something is also not true in many parts of
         | the world. See:
         | https://en.wikipedia.org/wiki/Key_disclosure_law
        
       | bobsoap wrote:
       | Ok, Google. I'll bite.
       | 
       | So you send me an email today titled "[Update] Google passkey
       | support will replace your built-in security key starting May 3,
       | 2023". It was in my spam folder, but I digress.
       | 
       | This "update" kindly informs me that "Passkey support will be
       | integrated because they're easier to use" [sic], that it's safer
       | than most other forms of 2-SV, that this new method will work on
       | any devices that have registered passkeys, which includes all
       | phones on which I'm signed in, that I'll be able to sign in to my
       | Google account with just a passkey, that no action is required
       | from me to do this, and that you're here to help.
       | 
       | Yes, Google, I'd like some help. For starters, I'd like to know:
       | 
       | - What do you mean by "built-in security key"? Built-in suggests
       | hardware, so my phone presumably has a hardware security chip and
       | now passkey is a new type of hardware chip for authentication?
       | 
       | - What's 2-SV? Two Sievert? Dos El Salvador? Double Support
       | Vector? Second Silicon Valley?
       | 
       | - What the heck is a passkey?
       | 
       | Luckily, you provide a link to your HC article [1], which I click
       | on. It's titled "Sign in with a passkey instead of a password".
       | It helpfully informs me that with a passkey, I can sign in to my
       | Google account with my fingerprint/face scan/device screen lock
       | like a PIN. There's a bunch of other valuable information in that
       | article, like how it won't work in Firefox, won't work in
       | incognito mode, that Bluetooth must be enabled, and that anyone
       | who manages to unlock my device gets full access to my account.
       | Needless to say, sounds totally awesome, I'm sold!!1
       | 
       | What the heck is a passkey?
       | 
       | Is it like the thing that sometimes uses my Android phone as a
       | 2FA device to sign into Google properties, just... somehow
       | different? What's the difference, except that I now need to
       | enable Bluetooth and can't use it in Firefox? How is it more
       | secure than [something I know + something I own] if it removes
       | [something I know] from the equation and only leaves me with one
       | of the two factors? How is it more secure than Dos El Salvador?
       | 
       | Who the heck wrote this email?
       | 
       | [1] https://support.google.com/accounts/answer/13548313
        
       | sys32768 wrote:
       | Can we call it something other than passkey? That sounds
       | suspiciously like password, but makes me picture a key fob.
       | 
       | Biometics? Authentication device?
        
         | Scion9066 wrote:
         | Pretty sure that's intentional. It's replacing something you
         | know (a word) with something you have (a key stored on a device
         | or some kind of account).
         | 
         | It doesn't necessarily need to use biometrics or be bound to a
         | specific device, so those aren't quite accurate. Thus, passkey.
        
       | hunter2_ wrote:
       | Came to HN today figuring there would be a thread about this,
       | after getting an email about it from Google themselves, riddled
       | with things causing me to wonder if the message was spoofed:
       | 
       | 1. "Dear User" -- other emails I've gotten from Google say
       | "Hello" or "Hi <firstname>" or have no salutation at all.
       | 
       | 2. The main section begins with "Passkey support will be
       | integrated because they're easier to use, and safer than most
       | other forms of 2-SV." -- The plural antecedent of "they're" is
       | merely implied (the literal plural antecedent "passkeys" isn't
       | actually written).
       | 
       | 3. In that same sentence, the comma before "and" is grammatically
       | incorrect. The comma should not exist, or it should be followed
       | by a complete sentence. The same comma rule is also violated in a
       | later sentence: "You won't need to enter a password to sign in to
       | your account, or to select only a single phone to use as your
       | built-in security key any longer."
       | 
       | I'm not really a huge stickler for grammar, but I've seen
       | countless "how to spot phishing" guides specifically suggesting
       | that we look for grammatical mistakes, as they're specifically
       | included for purposes of improving the ratio of hooked phish to
       | eaten phish, so it follows that messages which aren't phishing
       | really ought to use correct grammar!
        
         | nobody9999 wrote:
         | >I'm not really a huge stickler for grammar, but I've seen
         | countless "how to spot phishing" guides specifically suggesting
         | that we look for grammatical mistakes, as they're specifically
         | included for purposes of improving the ratio of hooked phish to
         | eaten phish, so it follows that messages which aren't phishing
         | really ought to use correct grammar!
         | 
         | Lily Tomlin & co. _could_ have made this[0] for Google today,
         | instead of for AT &T ~50 years ago.
         | 
         | The dynamics haven't changed, just the corporations involved.
         | And more's the pity.
         | 
         | [0] https://vimeo.com/355556831
        
         | tialaramex wrote:
         | > I've seen countless "how to spot phishing" guides
         | 
         | One of the things you'd see those guides mention _a lot_ is the
         | call to action. The bad guys want you to do something for them,
         | otherwise they wouldn 't send you email.
         | 
         | In contrast the Google email you're complaining about says, "No
         | action is required from you" which is my favourite type of
         | letter from every company. Can I forget all about this and take
         | no action? You bet I can.
        
       | SheinhardtWigCo wrote:
       | Users pay a subtle price for the perceived convenience of
       | passkeys when it's time to migrate to another platform.
       | 
       | Before, you could just sign in to your password manager on the
       | new platform, and get a 2FA prompt the first time you sign in to
       | any particular site (so you're manually entering one additional
       | factor per site). With passkeys, you have to do account
       | _recovery_ , so you have to manually provide two factors per
       | site. That translates to hours of cumulative extra work.
       | 
       | It's an opportunity to increase platform stickiness, backed by a
       | flimsy security excuse. Nobody using a password manager is
       | getting their accounts hacked unless the vendor is breached or
       | they have malware on their system. Passkeys don't help in either
       | scenario. And the UX isn't materially better than the built-in
       | password manager, though I guess that's a matter of opinion.
        
       | RobotToaster wrote:
       | Doesn't this just mean giving control of authentication to
       | proprietary systems like google?
       | 
       | I can't find a single FIDO level 2 (or higher) certified
       | implementation that is open source?
        
       | breakingrules wrote:
       | [dead]
        
       | Armic wrote:
       | What happens if you lose all your hardware factors (eg if you
       | have a home fire)? Are you just locked out of all your accounts
       | with this approach?
        
         | barkerja wrote:
         | Not if the Passkey was synced (ex: you used iCloud keychain).
         | If the passkey was not synced, then I would have to assume it
         | would be the same if you lost a physical hardware key.
        
           | Gasp0de wrote:
           | How do you access iCloud without your passkey?
        
             | AlexandrB wrote:
             | Complain loudly on Twitter and hope your tweet goes viral.
        
             | warkdarrior wrote:
             | Call Tim, he'll vouch for you.
        
             | ezfe wrote:
             | Apple account recovery supports setting a recovery code or
             | having a friend listed as a recovery contact.
             | 
             | Apple does not yet support Passkey for iCloud accounts
             | login.
        
             | barkerja wrote:
             | I use a yubikey. But AFAIK, Apple doesn't actually use
             | passkeys for iCloud/Apple ID authentication.
        
       | jamesdepp wrote:
       | Until there is a viable way to sync passkeys between all devices,
       | all platforms, and all browsers, I will be happily sticking to my
       | passwords. The security benefits provided by passkeys are not
       | enough to offset the ecosystem lock-in that passkeys cause.
        
         | CharlesW wrote:
         | What ecosystem lock-in are you talking about, exactly? I just
         | created a passkey for Chrome on my macOS desktop and another on
         | iOS. The Chrome passkey will sync to Chrome for Windows, my iOS
         | passkey will sync to my other Apple devices, and I can create
         | more as needed.
        
       | teeray wrote:
       | I really wish these "password killers" would acknowledge that we
       | will _never_ eliminate passwords. Ever. There's too many under-
       | funded applications deployed out there that have no resources to
       | add passkey support. Password managers are an excellent place to
       | progressively enhance the user authentication story and could
       | support more advanced schemes like passkeys while remaining
       | compatible with the registry of deeds site from 1999. Instead,
       | it's always presented as some other thing (usually conveniently
       | tied to Chrome) that you have in lieu of your password manager.
        
         | awaythrow98765 wrote:
         | Actually I'd see a future where some of those password killers
         | might replace passwords, even for some of the under-funded,
         | under-manned applications out there.
         | 
         | What is necessary is a robust, simple-to-integrate standard for
         | authentication, authorization and sessions built into HTTP.
         | Such that all the "hard work" is integrated into common HTTP
         | server software or load balancers, transparently. From an
         | application perspective it should just look like your request
         | getting HTTP_USER=someone HTTP_PERMISSIONS="stuff,foo,bar"
         | HTTP_SESSION="0xdeadbeef", similar to what you get from HTTP
         | basic or negotiate auth, but with a few more necessary features
         | such as session, login/out and a permission model. Browsers
         | would have to provide some proper UI for that, not utter crap
         | like they currently do for HTTP basic or negotiate auth.
         | 
         | Then your centralized auth application can just talk to any old
         | application in a very simple way, no need to deal with huge
         | integration headaches like OAuth or stuff. And the centralized
         | auth application can do all the fancy password killer, 2FA,
         | magic or whatever special auth you need.
        
         | ilyt wrote:
         | Yeah, none of big tech wants that, they don't want to make it
         | easy for 3rd party.
         | 
         | Ideally there would just be standarized interface between
         | "credential manager" and applications + some OS-enforced
         | security (so password manager knows which PID sent the question
         | about password or other type of credential).
         | 
         | Then we could have say pub/privkey or cert based authentication
         | implemented there, app just asks for a credential for a site
         | and cred manager asks user whether to allow it once or forever,
         | and which credential to give.
         | 
         | The app then could garnish that with extra metadata so say
         | firefox container feature, or different firefox profile could
         | attach metadata about from which container or profile the
         | request comes from, and credential manager could hand out
         | different credentials based on from where it came.
        
           | lxgr wrote:
           | > Yeah, none of big tech wants that, they don't want to make
           | it easy for 3rd party.
           | 
           | iOS has an API for password managers and HOTP/TOTP
           | authenticators. Android is planning to introduce one for
           | passkeys.
        
       | Gasp0de wrote:
       | There is a legal advantage that passwords have that passkeys and
       | FIDO and so on do not have. In civilized countries, no one can
       | force you to hand over a password (as you have a right to not
       | incriminate yourself). That does not hold for property which can
       | be confiscated or even biometric attributes which can be taken
       | against your will legally.
       | 
       | Theoretically, passkeys could still offer this advantage if they
       | are stored exclusively on my phone which is encrypted and secured
       | with a password.
        
         | oasisbob wrote:
         | > In civilized countries, no one can force you to hand over a
         | password (as you have a right to not incriminate yourself).
         | 
         | Which countries?
         | 
         | In the US, the intersection between 5th amendment rights and
         | password disclosure is not complete. You can be forced to
         | disclose a password in certain circumstances here.
        
           | stinkytaco wrote:
           | I think in Florida v. Voigt someone was sentenced to 6 months
           | for not handing their iPhone password in an extortion case.
           | If I recall, the phone was ultimately hacked to get the
           | evidence.
        
           | croes wrote:
           | And if you don't comply?
           | 
           | With biometric data like FaceId or fingerprint it's easier
           | for them to get access.
        
           | __turbobrew__ wrote:
           | In Canada it has been upheld that you cannot be compelled to
           | divulge your passwords as it violates the Charter of Rights
           | and Freedoms.
        
           | sixstringtheory wrote:
           | This was not my understanding so I looked it up and found
           | this: https://www.reuters.com/business/legal/us-supreme-
           | court-nixe...
           | 
           | Wherein it mentions passwords are considered testimonial and
           | therefore protected by the 5th, but device passcodes were
           | ruled to be exempted under the "forgone conclusion" exception
           | to the 5th (TIL about that).
           | 
           | Is this kind of thing you are referring to?
        
           | themoonisachees wrote:
           | Pretty much only the US explicits this right. I know France
           | tacks on more charges to protesters who refuse to unlock
           | their phones when arrested.
        
             | Hamuko wrote:
             | Has that been tested with the ECJ yet?
        
         | 015a wrote:
         | As opposed to where you store your passwords? I can only speak
         | for me, but they're in 1Password; if the police get my phone,
         | the same thing protects 1Password as would protect these
         | passkey private keys: FaceID, maybe a PIN if a lockout can be
         | triggered before they get it, and at its core, the Secure
         | Enclave. There's no legal advantage to passwords, unless you
         | were actually memorizing every password you've got (and if
         | that's the case, son we got bigger fish to fry).
         | 
         | A ton of people in our bubble have this Mission Impossible-
         | esque view of their security footprint, which simply isn't true
         | in reality. Its XKCD 538 every time this comes up.
        
         | lxgr wrote:
         | Passkeys are an authentication mechanism, and as such replace
         | (authentication) passwords, not (encryption) passphrases.
         | 
         | A password (at least as I understand the term) is used to
         | authenticate to some third-party entity to get access to your
         | data or services. The (implied or legal) contract here is:
         | "Only give access to my data to anybody that can provide my
         | password."
         | 
         | Government authorities can in most cases just go to the service
         | and demand that access legally; there is no need to get your
         | password through whatever means.
         | 
         | A passphrase, on the other hand, can be used to encrypt your
         | data directly, and the service provider might not be able to
         | hand over your data to the authorities without it.
        
           | angry_octet wrote:
           | This is incorrect because you're conflating access by request
           | and access with a court order. Without a warrant, or even
           | probable cause, police can get some meta data, but not
           | everything in the cloud. In many places police can force you
           | to use biometrics to unlock devices, but not compel a
           | passphrase. (Passphrases are significantly harder for e.g.
           | Greykey to glitch brute force than PINs.)
        
             | lxgr wrote:
             | What's "access by request"?
             | 
             | > Passphrases are significantly harder for e.g. Greykey to
             | glitch brute force than PINs.
             | 
             | PINs are their own thing, i.e. neither passwords nor
             | passphrases. They form a hierarchy:
             | 
             | Passphrases: High (enough) entropy; can be stretched into
             | an encryption key using a PBKDF.
             | 
             | Passwords: Medium entropy; long enough to be somewhat
             | brute-force resistant in case of a database breach. Can't
             | really be used to encrypt data by themselves.
             | 
             | PINs: Very low entropy, must be part of a larger, trusted
             | system that can reliably enforce limits on invalid PIN
             | attempts. Practically, this means tamper-resistant
             | hardware, e.g. a HSM, TPM, smartcard, Yubikey...
        
           | ilyt wrote:
           | Great! Where I can type those passhphrase in google mail or
           | o365 or million other serivces to secure my data ?
           | 
           | Oh? Nowhere? Then why you're even talking about the
           | distinction ?
           | 
           | Also passphrase definition is definitely not "a password used
           | for encryption", I dunno where you pulled that from. Original
           | meaning is just "longer, more secure password"
        
             | lxgr wrote:
             | > Then why you're even talking about the distinction ?
             | 
             | GP was talking about the legal implications of using a
             | hardware authenticator vs. a password.
             | 
             | > Original meaning is just "longer, more secure password"
             | 
             | And where do you usually need a longer, more secure
             | password? Encryption (as opposed to authentication, where
             | you can often rate-limit attempts) immediately comes to
             | mind.
             | 
             | > I dunno where you pulled that from.
             | 
             | From https://en.wikipedia.org/wiki/Passphrase:
             | 
             | [...] , especially those that derive an encryption key from
             | a passphrase [...]
        
       | kmlx wrote:
       | i've got passkeys enabled on github, cloudflare, google, twitter
       | etc via apple's passkey implementation
       | (https://support.apple.com/en-
       | gb/guide/iphone/iphf538ea8d0/io...). they all implemented
       | passkeys as an alternative to sms OTP. very easy to use, and
       | should be better than sms, but still haven't seen full on login
       | using passkeys. if anyone knows of such a site i'm curios how
       | they implemented it.
        
       | blep-arsh wrote:
       | It seems there's no way to prevent an Android device from
       | creating and registering a passkey when signing in to a Google
       | account on the device. Also, once you opt in, there's no way to
       | opt out of using passkeys except by signing out of all Android
       | devices. Great. Entrusting my Google account to my Fiio MP3
       | player for safekeeping was exactly what I was looking for.
        
       | Phemist wrote:
       | Argh.
       | 
       | Passwords are amazing. I loathe many of the attempts at replacing
       | them simply because the _average_ user has proven to be unable to
       | manage them.
       | 
       | The three factors of authentication are a thing because they all
       | protect against somewhat orthogonal threat vectors.
       | 
       | Possession "have" is nice because it binds the authentication to
       | a single thing in the real world (as opposed to some digital
       | thing that can be copied endlessly). Biometrics, if nice, is
       | something that is relatively unique and always carried with you
       | (mostly identification), and bind the factor to a person, secrets
       | like passwords are nice because they essentially bind the factor
       | to the intent, in that a user displays their secret behaviour (of
       | which passwords are one) as opposed to not displaying the
       | behaviour.
       | 
       | Articles that solely focus on the downsides of passwords, often
       | neglect downsides of the other factor types. What are ways the
       | strong personal binding of the "are" factor can be abused if
       | there is no intent? FaceID/TouchID on sleeping or otherwise
       | inattentive persons is a prime one.
       | 
       | All factor-types can work in ways that complement eachother.
       | Removing or at least weakening passwords is not a good way
       | forward, we need to work on fusing all the factor-types jnto a
       | single strong 3-factor auth
        
       | breakingrules wrote:
       | [dead]
        
       | 2OEH8eoCRo0 wrote:
       | When a company rolls out something new and exciting that will
       | improve your life, ask yourself: why are they spending money on
       | this?
       | 
       | Just stuffing more of our private lives into phones full of ads
       | and tracking. Each time you unlock your phone Google makes money.
        
         | AlexandrB wrote:
         | There _is_ a less sinister motive available - reducing customer
         | support costs - but the default of syncing everything to the
         | cloud does give me pause.
        
       | organman91 wrote:
       | It looks like this is a wrapper around public/private keys stored
       | on a device: https://security.googleblog.com/2023/05/so-long-
       | passwords-th...
        
       | chunk_waffle wrote:
       | Forgive me if I sound dense but you would still want a password
       | to unlock the private key, right? Otherwise, authentication is
       | just "something you have" not "something you know + something you
       | have." In which case, this headline might really mean "The
       | beginning of the end of the password on the web".
        
       | jesterpm wrote:
       | I don't use my google account for much anymore, but I love the
       | idea. I tried very hard to use it and... it didn't work.
       | 
       | I went to my google account and clicked "Create a passkey", but
       | apparent my "device doesn't support creating passkeys" (Linux,
       | Firefox).
       | 
       | The page said my Pixel 2 has an automatically created passkey, so
       | maybe I could experience the "use another device to sign in"
       | flow. Opened a private window and my only option was a password
       | (but there was a feedback prompt asking why I still wanted to use
       | a password).
       | 
       | I tried again with Firefox on Android, but the "Create a passkey"
       | button doesn't even appear. Same story with Chrome on Android.
       | 
       | Is it just me, or does the future look a lot like Internet
       | Explorer in the early 2000s?
        
       | XorNot wrote:
       | I hate this, I hate every part of this.
       | 
       | The attempt to get rid of passwords has been the biggest assault
       | on the free internet in recent history, and people are asleep at
       | the wheel as it's happening.
       | 
       | They want to tie you to an external service, so they can tie you
       | to your phone, which they also manage with another external
       | service.
       | 
       | All of these schemes are braindead with obtuse, user-unfriendly
       | backup/transfer/restore options. They fail at even making things
       | "simple" for _regular_ users.
        
         | ghaff wrote:
         | Passwords are terrible for a world where people have hundreds
         | of them and are lazy. And password managers are a bandaid
         | solution.
         | 
         | Arguing effectively that passwords were fine for computing in
         | 1970 isn't an answer. So if you don't like passkeys it's
         | reasonable to ask for your alternative.
        
           | garganzol wrote:
           | Whatever an alternative would be, it should be decentralized.
        
           | photochemsyn wrote:
           | The first point seems correct, the second seems incorrect.
           | Remembering a single password for access to a secure well-
           | designed password manager seems a bit more secure than a
           | physical passkey, what am I missing?
        
             | ghaff wrote:
             | Because password managers that you (and many others) use
             | all the time are probably a more serious attack vector than
             | your bank deposit box.
        
         | asimpletune wrote:
         | But you still need a password to use a passkey right? So
         | passwords aren't going away, they're just being used to a more
         | secure way.
         | 
         | My mom can't tell if a website is fake if it's made to look
         | exactly like Facebook, for example. So in a sense passwords are
         | actually awful for users because they're required to remember
         | dozens of passwords and verify that a website is legit. If they
         | just reuse the same password everywhere then they are
         | vulnerable to another kind of attack because some website
         | somewhere will mishandle it, forcing her to change every
         | password on every site afterward.
         | 
         | Instead, she can have the best of both worlds by remembering
         | one master password, that basically opens a magic app that will
         | check that the website is legit and create/retrieve a unique
         | passkey for each login.
        
           | eviks wrote:
           | > remember dozens of passwords and verify that a website is
           | legit
           | 
           | Or use a password manager to solve both of these issues
           | 
           | Except you're not tied to a magic phone
        
         | ajmarsh wrote:
         | Nothing prevents anyone from creating an open-source
         | implementation of the FIDO server/services.
         | 
         | For example: https://github.com/StrongKey/fido2
        
         | bsenftner wrote:
         | This is the truth.
         | 
         | If this Passkey sounds like a good idea, you've been
         | propagandized to be yet another stupid lemming.
        
           | [deleted]
        
           | jmull wrote:
           | To avoid being a propagandized lemming you have to have a
           | basic understanding of what is happening...
           | 
           | passkeys aren't tied to Google or to any other specific
           | provider. Note that this announcement is just about Google
           | supporting logging to with passkeys to their platform. But
           | you don't have to have anything to do with Google to use
           | passkeys with other sites/apps that support them.
        
             | garganzol wrote:
             | Disguising a proprietary development under an industry
             | standard umbrella is a typical move from Corporate Utopia
             | playbook. That's why it is so easy to spot when somebody
             | tries to manipulate public opinion using social media
             | accounts.
             | 
             | It would be a totally different situation if customers were
             | actually interested in a particular solution. Otherwise,
             | it's all astroturfing and nothing can really change that.
             | 
             | Also it's always a good tone to put a disclaimer, e.g.
             | "Googler".
        
               | cromwellian wrote:
               | Ex-Googler, laid off, so no allegiance.
               | 
               | It's not a proprietary development. The intention to use
               | private keys for authentication goes all the way back to
               | the KEYGEN tag in HTML. WebAuthn started from FIDO, not
               | Google, and FIDO Alliance was started in 2012 by PayPal,
               | Lenovo, and others, not Google, Apple, etc. Google joined
               | in 2013, and they were mostly interested in 2FA at that
               | point. And prior to that, when I worked at IBM TJ Watson
               | in the 90s on some of the first TPMs, we were developing
               | passkey equivalents using public key crypto for login and
               | digital signatures on ThinkPads and RS/6000 workstations.
               | 
               | This work, desire to use public key crypto for
               | authentication, goes back A LONG time practically before
               | the internet was taken over by corporations.
               | 
               | This is a good thing for the public. Passwords _suck_.
               | The number of people who have been pwn3d and phished due
               | to passwords is insane, they 're user hostile in so many
               | ways "It would be a totally different situation if
               | customers were actually interested in a particular
               | solution", are customers actually interested in
               | constantly logging in with password and SMS codes -- the
               | default today. Does anyone love using authenticators, or
               | Apple 2FA popups, security keys?
        
               | garganzol wrote:
               | Thank you for sharing the historical context. So, I have
               | to wear off my tin foil hat, at least for today.
        
               | jmull wrote:
               | > Disguising a proprietary development under an industry
               | standard umbrella is a typical move from Corporate Utopia
               | playbook.
               | 
               | OK, but is that what's going on here?
               | 
               | There's the suggestion in this part of the thread that
               | somehow this all inhibits user freedom. But these
               | objections appear to come out of complete ignorance of
               | what is actually happening. I'm pointing it out because
               | it's the people who are most concerned about corporate
               | manipulation that need to understand what's happening to
               | have any idea on how to guard against it.
               | 
               | > Also it's always a good tone to put a disclaimer, e.g.
               | "Googler".
               | 
               | I guess you're suggesting I'm a Google shill? Well, (1)
               | you're wrong (in fact, I got rid of all the Google things
               | I used to use personally); (2) did I even say anything
               | helpful to Google?
               | 
               | I suggest to take off the tin-foil hat of paranoia. It's
               | not going to protect you from anything and, in fact, will
               | make you more vulnerable if you let it cause you to focus
               | on the wrong things.
        
         | Pxtl wrote:
         | Okay, but the alternative is users managing a separate password
         | for every service, which is impossible to do securely without
         | using a password-manager, and the password-manager is basically
         | a weaker version of an external service like Google's.
        
           | [deleted]
        
           | recursive wrote:
           | Weaker? The UX for signing in on a new device seems better.
           | Maybe that's the same thing as weaker. I'm not seeing any
           | reason in all of this to switch from a password manager
           | though.
        
         | neilalexander wrote:
         | Nothing about this is tied to phones or external services. You
         | could just use a hardware authenticator (like a YubiKey) as a
         | device-bound passkey if that is what you prefer.
        
       | lazyeye wrote:
       | More Google tracking.
       | 
       | I wonder if they get your device fingerprint on login too.
        
       | alberth wrote:
       | Dumb questions:
       | 
       | 1. what's the backup login mechanism when you lose your mobile
       | device?
       | 
       | 2. with Passkeys enabled/used, will this stop google from
       | randomly locking my account because I happen to be a person who
       | travels a lot and they constantly think I'm a fraudster
       | attempting to log into my own account.
       | 
       | 3a. can I use my google passkey for logging into non-Google
       | sites?
       | 
       | 3b. can I use my google passkey (biometric) to log into sites
       | that don't accept "Sign in with Google"? (meaning, other sites
       | tap into my same enrolled passkey biometric)
       | 
       | 4a. is the way to think about Passkey is that, it's basically
       | turning your mobile device into an open-standard Yubikey?
       | (meaning, Yubikey is a hardware biometric that you need to be in
       | possession of to login. Passkeys turns your mobile phone to
       | functionally perform the equivalent of Yubikey)
       | 
       | 4b. Or is the way to think about passkeys is that's it's
       | effectively just a password manager (like 1Password) that you use
       | your biometric to unlock?
       | 
       | 5. is FaceID a "passkey"?
       | 
       | 6a. can a Passkey be paired with a mobile Drivers license, to
       | effectively create an eID?
       | 
       | 6b. if so, would this be a competitive threat to all the KYC
       | offerings that exist in the world (because now you have a
       | verified biometric login that can be used for new account
       | openings)?
        
         | jmholla wrote:
         | Here's what Google has to say [0]:
         | 
         | > Passkeys use public key cryptography. Public key cryptography
         | reduces the threat from potential data breaches. When a user
         | creates a passkey with a site or application, this generates a
         | public-private key pair on the user's device. Only the public
         | key is stored by the site, but this alone is useless to an
         | attacker. An attacker can't derive the user's private key from
         | the data stored on the server, which is required to complete
         | authentication. > Because passkeys are bound to a website or
         | app's identity, they're safe from phishing attacks. The browser
         | and operating system ensure that a passkey can only be used
         | with the website or app that created them. This frees users
         | from being responsible for signing in to the genuine website or
         | app.
         | 
         | Two is already handled by a good password manager (which every
         | announcement of passkeys leaves out), so the real benefits are
         | in one. Instead of providing the same password each time, you
         | prove that you have your private key in a way only that website
         | (or whatever holds the public key) can ask.
         | 
         | Among the many issues, I think the biggest is that this
         | functionality is being locked behind these large corporations
         | as gate keepers. Is anyone aware of any open source, self-
         | hostable work to provide passkey functionality?
         | 
         | It seems to me not all of it could be since some
         | implementations will require that you prove your private key is
         | stored by a special chips that can be attested which you
         | necessarily can't muck with or reproduce (at least without a
         | lot of effort and maybe running afoul of laws). And there's
         | nothing that guarantees that your keys can be take elsewhere
         | unlike passwords which you can do whatever you want with.
         | 
         | Something else to keep in mind, when they talk about the
         | guarantees of passkeys, they're talking about several other
         | layers of technology. That's why password managers already
         | offer a lot of the security being touted.
         | 
         | [0]: https://developers.google.com/identity/passkeys
        
         | lxgr wrote:
         | > 1. what's the backup login mechanism when you lose your
         | mobile device?
         | 
         | Passkeys are synced to the cloud by default on iOS and Android,
         | which is probably a good idea for many use cases, but might not
         | be what you want in some instances.
         | 
         | > will this stop google from randomly locking my account
         | because I happen to be a person who travels a lot and they
         | constantly think I'm a fraudster attempting to log into my own
         | account.
         | 
         | Probably not, but it will make it much easier to log back in -
         | you won't even need to type your password if you use a 2FA-
         | capable authenticator/passkey.
         | 
         | > 3a. can I use my google passkey for logging into non-Google
         | sites?
         | 
         | No, a Passkey is bound to a website. But you can create as many
         | of these as you want.
        
           | InCityDreams wrote:
           | >Passkeys are synced to the cloud by default on iOS and
           | Android, which is probably a good idea for many use cases,
           | 
           | Gtfo.
        
           | clnq wrote:
           | > Passkeys are synced to the cloud by default on iOS and
           | Android, which is probably a good idea for many use cases,
           | but might not be what you want in some instances.
           | 
           | Okay, but Google is suggesting logging into their account
           | with a passkey, so how do I access the cloud if I lose the
           | devices with my Google passkey?
        
           | hedora wrote:
           | Like the commenter you are responding to, I still don't
           | understand how any of this can possibly work in practice.
           | 
           | > Passkeys are synced to the cloud by default on iOS and
           | Android, which is probably a good idea for many use cases,
           | but might not be what you want in some instances.
           | 
           | OK, so how do I use my cloud synced passkey to log on to my
           | Google account (which no longer has a password or other
           | secret that I can back up locally) after I lose my phone?
           | 
           | > Probably not, but it will make it much easier to log back
           | in - you won't even need to type your password if you use a
           | 2FA-capable authenticator/passkey.
           | 
           | OK, but if the account is locked, that just gets them to
           | display the "you're screwed" screen faster (since they don't
           | need to wait for me to type a password), and the blast radius
           | goes from just my Google account to all my other accounts,
           | right?
        
             | lxgr wrote:
             | > [...] how do I use my cloud synced passkey to log on to
             | my Google account (which no longer has a password or other
             | secret that I can back up locally) after I lose my phone?
             | 
             | You don't, in the same way that you can't store the
             | password to your password manager in your password manager.
             | That's why having another way to log back in to your
             | Passkey sync/backup account is crucial.
             | 
             | > OK, but if the account is locked, that just gets them to
             | display the "you're screwed" screen faster (since they
             | don't need to wait for me to type a password), and the
             | blast radius goes from just my Google account to all my
             | other accounts, right?
             | 
             | If you lose both access to your Google account and all of
             | your devices that have your Passkeys locally synchronized,
             | yes. The same goes for somebody taking over one
             | synchronized device and remotely deleting all of your
             | passkeys before you can take another device offline.
             | 
             | I'm personally pretty skeptical of passkey synchronization
             | by default without a way to opt out, but I can see how
             | availability might be just as big a concern for most non-
             | technical users as security.
        
       | jdeibele wrote:
       | I've lost a lot of confidence in Apple's keychain. I had been
       | using iCloud Keychain and backing up username and password into
       | BitWarden.
       | 
       | I say "had been" because 189 lines of garbage entries are in
       | iCloud Keychain and I can't get them out. They look like this:
       | 
       | Title,URL,Username,Password,Notes,OTPAuth www.amazon.com (MEoEEPg
       | AAAAAAAAAAAAAAAAAAAEwFAYIKoZIhvcNAwcECJeL6XzO81KJBCA02+DHVDASQ5Y3
       | hOVrhGjCxV9Mv9qSEOc7uod7iKS3Rw==),https://www.amazon.com/,MEoEEPg
       | AAAAAAAAAAAAAAAAAAAEwFAYIKoZI...,, (repeat for various sites 188
       | times)
       | 
       | I've tried deleting them multiple times but they always come
       | back. I've filed Feedback with Apple but no acknowledgement of
       | the problem. There's no hint as to whether the problem is with
       | one of my devices or with iCloud.
       | 
       | I've switched over to BitWarden entirely. At some point, I guess
       | I try deleting the keychain and starting over but I really am
       | concerned about using something that allows an error like this.
        
       | dgrin91 wrote:
       | How is this more secure? They say "with a fingerprint, a face
       | scan or a screen lock PIN", but basically all phones let you fall
       | back to PINs if you dont want to do face or fingerprints. Pins
       | are flat out not secure - typically just 4 digits.
       | 
       | Yeah its probably better than 80% of people having "password123",
       | but it seems strictly worse than a password + password manager?
       | Or at least just having proper 2FA.
        
         | bkettle wrote:
         | A PIN entered onto a physical device like a smartphone can be
         | rate limited (see iPhone progressively increasing PIN
         | timeouts). If you try to rate limit password entry to an online
         | service, you make it trivially easy for an attacker to lock out
         | a real user.
         | 
         | Thus, even short PINs can provide strong security since the
         | attacker gets, e.g., at most 10 tries to guess it out of 100k
         | possibilities for a 6-digit PIN.
        
         | ferminaut wrote:
         | it's more secure on the back end. The DB will store a hashed
         | unique pass phrase that isnt shared with anyone else.
         | 
         | You enter a pin, the web server sees a public key that only
         | your side has the private key to.
        
         | bhk wrote:
         | Being tied to a device, it defeats the most serious threats of
         | phishing and weak passwords, for which attacks can be mounted
         | on a global scale.
         | 
         | 2FA via SMS is still vulnerable. 2FA with an app like Google
         | Authenticator or VIPAccess is more secure because it is tied to
         | a device.
        
           | ilyt wrote:
           | The devices are far from being security bastion.
        
           | jjav wrote:
           | > more secure because it is tied to a device
           | 
           | Tied to a phone (as opposed to some security-specific device
           | like a Yubikey) is a terrible idea.
           | 
           | It ties your authentication to something that is often lost
           | or damages, but more importantly, something that is
           | controlled by a third party (apple or google) _and_ requires
           | an expensive monthly subscription to yet another third party
           | (your cellphone company).
           | 
           | TOTP is not tied to a device which is why it's a beautiful
           | solution. You can store it where you wish under the controls
           | you wish and back it up as you wish. You are fully in
           | control, dependent on nobody.
        
         | surteen wrote:
         | Because it's a PIN protecting a certificate stored on the
         | device. Even if you know the PIN but don't have access to the
         | device, you can't use it.
        
           | toomuchtodo wrote:
           | And the pin is the same functionality as activating a
           | hardware authenticator like a Yubikey.
        
             | stouset wrote:
             | ... which have historically yielded credentials at _any_
             | touch, without a need for a PIN, fingerprint, or face scan.
        
         | wepple wrote:
         | Password + password manager can be trivially phished. PIN
         | can't, because even if you somehow phished a user you can't use
         | it.
         | 
         | I don't know what "proper 2FA" means but the gold standard
         | today is U2F, and it has failed to be mass adopted due to
         | requirement to purchase and maintain another device.
        
           | aidenn0 wrote:
           | FWIW, my password manager has prevented me from being phished
           | because it wouldn't auto-fill the password.
        
         | VoodooJuJu wrote:
         | >with a fingerprint, a face scan or a screen lock PIN
         | 
         | I agree - not secure.
         | 
         | And just a daily reminder that biometrics are _usernames_ ,
         | they are _not_ passwords. You can change a password, a lock, a
         | key, you cannot change biometrics, and thus they should not be
         | used for guarding sensitive info.
         | 
         | The only use-case for biometrics is deanonymization, sold to
         | you under the auspices of security, primarily used for
         | corporate surveillance.
        
           | pcthrowaway wrote:
           | Biometrics are shitty usernames too. They _might_ change, it
           | 's just outside of your control.
           | 
           | My apple touchID never works because I rock climb and I guess
           | that abrades the skin too much
        
             | nilsbunger wrote:
             | i rowed on a crew team for many years. The pads of my
             | fingers were all worn down. I was rejected three times for
             | "bad fingerprints" when applying for US citizenship.
        
               | JohnFen wrote:
               | It's not as rare as people think for fingerprints to be
               | messed up either permanently or temporarily. Which amazes
               | me, actually, because I'll be willing to be pretty near
               | 100% of adults have, at least once in their lives, burned
               | or otherwise injured their fingers in a way that alters
               | their prints.
               | 
               | Relying on fingerprints to gain access to things on a
               | regular basis never seemed like a great idea to me.
        
           | wepple wrote:
           | > The only use-case for biometrics is deanonymization, sold
           | to you under the auspices of security, primarily used for
           | corporate surveillance.
           | 
           | Please provide evidence that biometric data has ever been
           | extracted from a major platform (IE Apple/enclave). Absence
           | of evidence != evidence of absence, I know, but you're
           | selling it as the _only_ use case so surely you have proof.
        
             | johndough wrote:
             | > Please provide evidence that biometric data has ever been
             | extracted from a major platform
             | 
             | Why extract it from a platform when it can be extracted
             | easily from the person? Imagine your password was written
             | on every surface you touched (fingerprint) or is
             | prominently displayed on your social media accounts (face).
        
               | startupsfail wrote:
               | I don't understand how this could work actually. From a
               | couple of photos on the social media you can likely
               | recover the 3d geometry of the face. From that, if the
               | signing algorithm is known, you should be able to
               | replicate these passkeys.
               | 
               | If the algorithm is not known, it's only a matter of time
               | it'd be leaked or reverse engineered. And then suddenly
               | there'd be a massive, difficult to fix security breach.
               | Just like the breaches that we have now, with voice based
               | authentication.
               | 
               | Can someone explain, how this can be mitigated?
        
               | wepple wrote:
               | That's not my understanding of how it works.
               | 
               | Your face geometry is used to allow access to a secure
               | processor (trustzone/Secure Enclave/etc) which then signs
               | the web token.
               | 
               | Which is why the phone is the "something you have" piece
               | of the puzzle here.
        
               | Scion9066 wrote:
               | The biometrics like your face or fingerprints aren't used
               | directly with the site you're trying to log into and
               | would never leave your device. It's just used to unlock
               | your phone/tablet/computer/whatever's stored secrets to
               | sign a message verifying it's you. If you don't trust the
               | biometric systems on your device or are worried about
               | someone stealing them and trying to fool your device's
               | hardware, you can always just not use them and just use a
               | passcode/password to protect your device instead.
        
               | wepple wrote:
               | How does my use of faceID on my iPhone promote de-
               | anonymization if it doesn't leave my phone?
               | 
               | Everything you've described can be done whether or not I
               | use biometric to sign into a device, or even own a
               | device?
        
               | fireflash38 wrote:
               | And then extrapolate to how those biometric factors could
               | be changed outside of your control -- car accident
               | requires facial reconstruction. Or a fire burns your
               | fingerprints.
        
               | jeroenhd wrote:
               | I cut myself on a cheese slicer once and had to use PIN
               | for unlocking my phone for a week or two while the cut
               | healed. Annoying, but that's what the fallback PIN was
               | for I guess.
        
           | akira2501 wrote:
           | > you cannot change biometrics
           | 
           | Bodies are not invulnerable to damage. You can absolutely
           | change your "biometrics", you just probably wouldn't _want_
           | to.
        
           | oli-g wrote:
           | > biometrics are usernames, they are not passwords
           | 
           | While I see where you're coming from, they really aren't just
           | usernames. It's not like I can log into your e-mail account
           | by typing VoodooJuJu and pressing Enter.
        
             | JohnFen wrote:
             | But most biometrics (at least faces and fingerprints) make
             | terrible passwords. They can be copied and they're very
             | hard to change if you need to.
        
           | somedudetbh wrote:
           | > And just a daily reminder that biometrics are usernames,
           | they are not passwords.
           | 
           | I think you should stop giving out this daily reminder. This
           | meme has outlived its usefulness.
           | 
           | Using face id to unlock a local key store to enable my device
           | to sign a signed challenge from a site I want to log into
           | with the private key stored on my device is not a 'username'
           | in any meaningful sense.
           | 
           | The problem is, the metaphor about passwords and usernames is
           | not a good, structure-preserving simplification of the actual
           | problem of authentication.
           | 
           | The biometric data and/or pin code are not being used to
           | prove that you are you to Gmail, it's being used to unlock
           | the set of private keys you have on your device. This doesn't
           | fit into the metaphor at all.
           | 
           | If my non-technical parents said they were migrating all
           | their accounts to passkeys, I would be very pleased. I
           | wouldn't be worried about their inability to change their
           | biometrics and that causing a problem following some sort of
           | breach in the future. I am highly worried about their extreme
           | susceptibility to phishing, especially in their inability to
           | distinguish phishing sites from real sites, or real account
           | maintence contacts via email and SMS from phishing contacts,
           | their reuse of very simple passwords that are probably
           | circulating in combolists already, and their general
           | inability to retain username/password pairs. I have a lot of
           | sympathy for them when I try to talk them through something
           | like logging in to an Apple device with their apple id, when
           | their appleid username is their email, which ends with
           | @gmail.com. "But...why would i log in to apple with my
           | gmail?" nevermind how confused they are about 'log in with
           | google', 'log in with facebook', etc.
           | 
           | Moving to a model where their devices store webauthn
           | credentials and guard them with a pin or faceid-style
           | biometric shortcut is a _massive_ improvement in practical
           | resistance to account takeover for my parents, and I don't
           | think continuing to say 'biometrics are usernames in authn'
           | is accurate or helpful.
        
             | latchkey wrote:
             | > _If my non-technical parents said they were migrating all
             | their accounts to passkeys, I would be very pleased. I
             | wouldn 't be worried about their inability to change their
             | biometrics_
             | 
             | My 76 yr old dad can't do it. His phone is some shitty
             | android trash that when he's setting up his biometrics, he
             | shakes a bit, and it never stores the finger data
             | correctly. I have to hold his finger and his phone at the
             | same time to even scan it. Then, unlocking is also super
             | unreliable because of the shaking. He refuses to get a
             | better phone cause this one "works well enough."
        
               | sam345 wrote:
               | This is so true - most older people I've worked with have
               | major problems with touch devices. No one has come up
               | with a satisfactory solution. This is not a new problem -
               | I remember working with my grandfather in his 80's on a
               | 286 equipped with a mouse - his arthritis prevented him
               | from accurately positioning the mouse. Today's touch
               | interfaces are far worse. And fingerprint scans are very
               | difficult to get right and use with older people. Maybe
               | face scans are fine but I've never trusted them.
               | Regardless of security logins, there are a host of other
               | issues - complex navigation, complex and confusing
               | layouts (especially desktop), and hard to manipulate
               | controls. One example, a simple zoom or skype call - why
               | hasn't anyone ever developed a simple device to allow for
               | same without having to use intricate controls. I've
               | always imagined something similar to the video enabled
               | nest or alexa devices but with physical knobs and push
               | buttons. There's a very large market being ignored for
               | some reason.
        
               | anonymouskimmer wrote:
               | > No one has come up with a satisfactory solution.
               | 
               | Stick your finger inside of a dynamically sizing
               | aperture, or clip a finger reader onto your finger? If
               | both the finger and the reader shake the same there
               | shouldn't be a problem.
               | 
               | That doesn't solve the general touch issue, but it solves
               | this particular case.
        
               | latchkey wrote:
               | Forcing my dad to carry around and stick something on his
               | finger just to get into his device, seems rather
               | overkill, don't you think?
        
               | anonymouskimmer wrote:
               | People carry around earpods, keychains, wallets. What's
               | one more little dongle on a keychain?
               | 
               | But sure, I agree
               | (https://news.ycombinator.com/item?id=35790638 ). I'm
               | just trying to come up with some workable solution. Not
               | trying to make the best of all possible worlds.
        
               | latchkey wrote:
               | Let me guess, you're not a 76 year old man.
        
               | anonymouskimmer wrote:
               | It doesn't fucking matter who I am if I don't have the
               | power to direct product development. Fads in product
               | development are Hobson's choice for us consumers. The
               | best we can do is try to work around them with other
               | products.
        
               | [deleted]
        
               | ryandrake wrote:
               | > There's a very large market being ignored for some
               | reason.
               | 
               | It's no surprise that the tech industry, which largely
               | employs urban, educated 20-somethings and 30-somethings,
               | tends to produce products aimed at urban, educated
               | 20-somethings and 30-somethings.
        
             | jrm4 wrote:
             | It's 100% accurate. And I get why it may not seem
             | _helpful,_ but I think this is simply due to this industry
             | trying too hard to cater to people who want things to be
             | 6-year-old level easy.
             | 
             | Security is HARD. There's no getting around that. Your data
             | is valuable and protecting it is not an easy task. At
             | _some_ level, security and convenience is a zero-sum game.
             | 
             | As for old people, my dad writes down his passwords on a
             | text file in his laptop and has a printed backup in the
             | house.
             | 
             | And, yes, he does have to bug me sometimes to re-login or
             | change a password, but we've _never_ had a security
             | problem, which is way more than can be said for a lot of
             | people who tried the INHERENTLY unsafe  "3rd party manager"
             | thing.
        
               | bb88 wrote:
               | > It's 100% accurate.
               | 
               | No it's not.
               | 
               | The security triad is "something you are", "something you
               | know", and "something you have". Fingerprints are
               | something you are. Usernames are something you claim to
               | be.
               | 
               | The username is the "claim" you are this person. The
               | password is the "proof" you are.
               | 
               | If I'm fingerprinted by any federal agency today (and my
               | fingerprints have been on file with the government since
               | the 90's for a security clearance), then my fingerprints
               | can serve as absolute proof of my identity. This is
               | helpful to me should my identity ever be stolen and I
               | need to show absolute proof of who I am.
        
               | withinboredom wrote:
               | Your fingerprints change over time (mine are different
               | from just five years ago -- as I learned when recently
               | renewing a visa a few weeks ago).
        
               | jrm4 wrote:
               | Good point, you're right. And with e.g. federal agencies,
               | this fine.
               | 
               | But given the relatively high level of laziness,
               | capriciousness, and general failure all around that is
               | "IT security by means of companies who are rarely held
               | accountable," it's good to point out that this is what
               | makes biometrics _worse_ than usernames and should
               | probably mostly be avoided, or at least optional.
        
               | bb88 wrote:
               | Your points are taken, but I do believe that the
               | "something you are" is better than the "something you
               | know" and "something you have" pieces -- as the knowledge
               | or the thing you have can be stolen.
               | 
               | Sure fingerprints, face scans, and iris scans can be
               | stolen as well. But certain things are really hard to
               | fake, including potentially, scans of faces and an iris
               | scan at the same time -- unless you can somehow graft a
               | new iris and grow a new face.
               | 
               | Put it like this: a dead victim is found naked along the
               | side of the road. Which leg(s) of the security triad can
               | the police use to prove the identity of the victim?
        
               | lcnPylGDnU4H9OF wrote:
               | Those are all factors in multi-factor authentication. If
               | a service does not require the "something you are"
               | there's still good security if they require the other two
               | factors. If the only required factor is "something you
               | are" that's bad security.
        
               | newaccount74 wrote:
               | They all require the "something you have" as well. Pretty
               | much all the face recognition / finger print tech on
               | mobiles is locked to a single device.
        
         | segmondy wrote:
         | This is more secure, passwords can't be stolen from the site.
         | Sure, let's go with the assumption that your phone can be
         | stolen. It would be only your phone. If a site has 100 million
         | users, an attacker could steal 100 million passwords. With this
         | approach, the attacker would have to steal 100 million phones.
         | No matter what password manager you use, with a password length
         | of 100 characters. The entire password list (encrypted) can be
         | stolen.
        
           | aidenn0 wrote:
           | This keeps you from ever sending the password to the site
           | (similar to e.g. SRP).
           | 
           | Most sites already don't store the password. If you have a
           | sufficiently strong password (i.e. very long, randomly
           | generated, stored in a password manager), it is likely _not_
           | computationally easier to recover the password from a hash
           | than it is from a public-key. The only improvement here is
           | that you don 't have to trust that the site is following
           | best-practices for storing passwords, as you never send them
           | the password.
           | 
           | [edit]
           | 
           | It _also_ prevents phishing attacks for those using some form
           | of entering a password other than autofill from the password-
           | manager.
        
         | NoMoreNicksLeft wrote:
         | You're forgetting Oyler's Law of Passwords: Humanity will be
         | forced to try each wrong approach to passwords, one at a time
         | and trial-and-error, for all eternity.
         | 
         | Slightly off-topic: If a website will not let me register and
         | complains that my password is too long, they're still storing
         | that in the underlying database as a properly-salted (modern
         | algo) hash, right?
        
         | neilalexander wrote:
         | > How is this more secure?
         | 
         | The three factors of authentication are:
         | 
         | 1. Something you have
         | 
         | 2. Something you know
         | 
         | 3. Something you are
         | 
         | Passkeys are typically 1+2 or 1+3 -- you'd need to have
         | physical access to the device either way.
        
         | [deleted]
        
         | petedoyle wrote:
         | This has been bothering me, a lot. Google talks [1] about how
         | Passkey replication is e2e encrypted between devices, but
         | AFAICT they're just using a pin + key derivation. A six digit
         | pin is like 20 bits of entropy before a KDF. [2]
         | 
         | Has anyone seen any docs that might help characterize how much
         | entropy the keys have for e2e encryption (Android/iOS)?
         | 
         | I must be missing something, because I can't see how Google
         | would call something e2e encrypted if the keys only have like
         | 30-35 bits of "effective" entropy after a KDF. But that seems
         | like it's the case??                   [1] "From the user's
         | point of view, this means that when using          a passkey
         | for the first time on the new device, they will          be
         | asked for an existing device's screen lock in order to
         | restore the end-to-end encryption keys"
         | 
         | [1]
         | https://security.googleblog.com/2022/10/SecurityofPasskeysin...
         | 
         | [2] https://www.omnicalculator.com/other/password-
         | entropy?c=SGD&...
        
           | 015a wrote:
           | Sure, but if that key derivation function is protected by a
           | "you get 10 attempts then we wipe the keys" safeguard, the
           | effective entropy is much higher. The question shouldn't
           | really surround the effective entropy of the PIN, but rather
           | the systems in-place to protect bypassing safeguards in the
           | key derivation function which render the actual entropy of
           | the PIN irrelevant. There probably isn't _no_ way around that
           | safeguard, but as more of this gets moved into trusted
           | compute silicon the level of sophistication required to
           | breach it goes up; and is one hardware revision or operating
           | system update away from being made moot again.
           | 
           | This thread really smells like https://xkcd.com/538/. Three
           | things you _have_ to remember, that are far more important
           | than any of the concerns you have:
           | 
           | 1) The effective entropy of the current system (passwords) is
           | "shrugs shoulders fuck it not our problem". Services can
           | enforce password entropy requirements. They cannot
           | effectually require users to use a unique password. They also
           | cannot forbid users from writing the password they use in a
           | .txt file on their desktop or post-it note or throwing it in
           | Apple Notes (EVERYONE does this outside of our bubble. Apple
           | Notes and Excel are the #1 and #2 password managers on the
           | planet). A six digit pin + hardware TPM key derivation is, at
           | best, the same thing that was guarding how most people store
           | their passwords anyway, and in many cases far better than the
           | current state (if a user's device has no E2EE, or if they're
           | syncing their passwords.xlsx file with Dropbox, etc).
           | 
           | 2) Passkeys do not and are not designed to protect against
           | nation-state level attackers. Passwords weren't either. They
           | also don't protect well against the "grab a hammer and beat
           | it out of him" threat vector; you're going to give up your
           | password, and tomorrow they'll probably have your iPhone and
           | your passkeys will be disclosed as well. Passkeys are
           | designed to protect against unsophisticated (and even
           | moderately sophisticated) attackers; phishing, data breaches,
           | etc.
           | 
           | 3) If you _want_ higher tiers of entropy guarding your
           | passkeys, you can do that. 1Password, as an example, _already
           | has this_ [1]. They store passkeys, and encrypt those
           | passkeys with their two-level account  & master password
           | keys. Done! If you don't like 1Password, you can roll your
           | own, and I'm sure OSS password managers like
           | gopass/keepass/etc will eventually add this.
           | Passkeys/WebAuthn don't prescribe to _anyone_ how you store
           | the private keys; Apple will do their thing, Google will do
           | their thing, you don 't have to use them, many people will,
           | and they'll be better off (see point 1).
           | 
           | [1] https://future.1password.com
        
             | petedoyle wrote:
             | > Sure, but if that key derivation function is protected by
             | a "you get 10 attempts then we wipe the keys" safeguard,
             | the effective entropy is much higher.
             | 
             | Thank you. 100% agree.
             | 
             | > Passkeys do not and are not designed to protect against
             | nation-state level attackers
             | 
             | I've been mulling over some use-cases where this is
             | important, hence the deep consideration over entropy. 100%
             | not a huge deal for the passkeys case for many 9's of
             | people.
        
           | sebk wrote:
           | Talking about Apple here because it's what I'm more familiar
           | with, and their security whitepapers are more widely
           | available.
           | 
           | The PIN and key derivation wraps the actual encryption key
           | that's stored locally in the device or secure enclave, not
           | the actual secrets that are stored in the provider's cloud.
           | The actual wrapping keys are random 256 bit AES-GCM keys.
           | This approach works because the secure enclave provides
           | measures against bruteforcing and tampering.
           | 
           | There is some controversy that I can't find an explanation
           | for in any whitepaper, specifically here:
           | https://support.apple.com/en-us/HT202303 where it reads
           | "(...) this data remains secure even in the case of a data
           | breach in the cloud. If you lose access to your account, only
           | you can recover this data, using your _device passcode or
           | password_ , recovery contact, or recovery key." because that
           | implies off-device use of the PIN, so those measures are
           | lost. There's no further explanation that I could find about
           | that. Some previous discussion about that particular point
           | here:
           | https://news.ycombinator.com/item?id=33897793&p=2#33900540
        
             | petedoyle wrote:
             | Thank you! I'm trying to understand more deeply, so I
             | appreciate it. :)
             | 
             | > This approach works because the secure enclave provides
             | measures against bruteforcing and tampering.
             | 
             | That's interesting!
             | 
             | > because that implies off-device use of the PIN, so those
             | measures are lost
             | 
             | This link from your previous thread is interesting:
             | https://support.apple.com/en-
             | sg/guide/security/sec3e341e75d/...
             | 
             | Uses SRP to let the device prove to iCloud HSMs that the
             | user entered the correct pin, without ever sending it over
             | the wire. The HSMs have similar protections for brute
             | forcing, etc.
             | 
             | From the docs I have a fairly high confidence entropy is
             | 256 bits for iCloud Keychain. I have much less confidence
             | on Android, but I'm still researching... :)
        
       | ExoticPearTree wrote:
       | The advantages are very poorly explained in the article.
       | 
       | Last time I read about this, you could use your phone or a FIDO
       | key to authenticate. Like if the phone was close to the computer
       | you could aithenticate the same way you can unlock your computer
       | with your watch.
       | 
       | So either this new technology is so advanced lesser minds don't
       | understand it or it jus adds a more cumbersome authentication
       | method instead of passwords and its adoption rate will be in
       | single digits.
        
         | mihaaly wrote:
         | My takeaway is that this is infinitly more secure for those do
         | not care about security - the "password1234" crowd, actually
         | their account may even be secure from them logging in from now
         | on -, for the rest it is about the same, but different.
        
       | dtech wrote:
       | It looks like a good change for the average user, a secret stored
       | on the device is likely a whole lot safer than just having a
       | password. Having it as the only factor seems less secure than
       | password + good extra factor like TOTP on device though.
       | 
       | I also wonder how a lost/broken/replaced device is dealth with,
       | especially given Google's less-than-stellar account lockout
       | history.
       | 
       |  _edit_ : I guess this is still MFA since you need both the
       | physical device and a fingerprint and phone unlock code
        
         | barkerja wrote:
         | Passkeys can also be used in addition to passwords, as a form
         | of 2FA. I've seen a number of sites approach Passkeys in this
         | manner.
         | 
         | Or if you really wanted to, you could flip it. You can allow
         | the Passkey to be the "password" and an actual password the
         | second-factor for the user.
        
       | Zamicol wrote:
       | On my website, I'm doing authentication via simple public key
       | authentication using Coze.
       | 
       | No passwords. No email. No Google. Just public key authentication
       | with private keys in possession of the user.
       | https://github.com/Cyphrme/Coze
        
         | 8organicbits wrote:
         | I've always expected end users would struggle to manage private
         | keys. What sort of users does your website have?
        
       | voytec wrote:
       | Coming soon to a device new you, from the authors of no E2E
       | encryption on Authenticator backups! [1]
       | 
       | [1] https://news.ycombinator.com/item?id=35708869
       | 
       | [1] https://news.ycombinator.com/item?id=35720460
        
       | attah_ wrote:
       | Google: What are Passkeys? Also Google: Goes on to not explain
       | what they are at all. That's about when i stopped taking it
       | seriously.
        
       | awaythrow98765 wrote:
       | Those passkeys are either insecure or unreliable. Let me explain:
       | 
       | Those passkeys are asymmetric cryptographic keypairs where the
       | private key is securely stored on a device, unlockable (for use,
       | not reading) only by convincing your devices security processor
       | to do so by pin/fingerprint/pattern. Which in itself can be
       | secure, given you do trust that magic security processor (which
       | you shouldn't, see yesterday's news for example). However, if
       | that key cannot be read, you cannot make a backup of it, so it
       | will be unrealiable and easy to loose. The recovery process will
       | either be insecure and prone to social engineering, or unreliable
       | because proving your identity will be nigh impossible without
       | that passkey. Now one could allow backups of a passkey, but then
       | that passkey would be as insecure as a password. One could allow
       | multiple instances of authorized passkeys, but those would be
       | even more insecure than passwords, because malicious software on
       | your device could create evil new key instances.
       | 
       | In all a bad and dangerous idea.
        
         | seti0Cha wrote:
         | The idea seems to be that you will either trust a provider like
         | Apple or Google to keep you private key safe and let them sync
         | it around, or you will create a passkey for each device that
         | you use. If you lose the device, deauthorize the passkey. If
         | you somehow lose the passkey itself, create another one, either
         | by using an older form of authentication, or by creating using
         | a different device to authenticate. There is no need for
         | passkey recovery or backup.
        
         | jmbwell wrote:
         | As an administrator, I hear you, but we have to adapt.
         | Passwords are awful. On the whole, the effort and energy spent
         | training people on passwords, battling phishing, dealing with
         | password managers, cleaning up from breaches, and more...
         | passwords can't die soon enough.
         | 
         | FWIW, asymmetric PKI is technically mature and relatively easy
         | to implement in most applications (without "vendor lock-in", I
         | might add to comments upthread), and there are ways to address
         | most of your concerns about key loss and recovery beyond what
         | you describe, as by the ring of trust scheme Apple uses, for
         | example.
         | 
         | The only way through this is forward. I'm confident it really
         | will get better once passwords become a smelly indicator of bad
         | security practice.
        
           | JohnFen wrote:
           | I'm looking forward to such glory days. Right now, however,
           | none of the solutions available are ones that I could live
           | with if I had to use them for everything. For one or two very
           | sensitive things, sure, but for everything? It's less of a
           | pain to use long, random passwords.
        
         | 015a wrote:
         | It would be a bad and dangerous idea, if what you said was
         | true; but it isn't.
         | 
         | Passkeys are just asymmetric key-pairs. There will be a variety
         | of client-side implementations. Some may make export and backup
         | difficult or impossible. Others, such as 1Password's _already
         | extant implementation_ advertise backup and synchronization as
         | a feature! There is _nothing_ about the passkey standard which
         | prescribes the reality you fear.
         | 
         | > Now one could allow backups of a passkey, but then that
         | passkey would be as insecure as a password.
         | 
         | Wrong, absolutely and entirely. Its still more secure, because
         | its an _asymmetric_ keypair, and you 're forgetting about the
         | far more common attack vector against password disclosure:
         | service breaches. That's how attackers learn about passwords
         | by-and-large. And this is not just some nice-to-have side-
         | benefit of passkeys: its a _core motivation_ of this standard.
         | With passwords, a service breach compromises not only the
         | accounts of every user on that service, but potentially every
         | other account every user has, globally, because of password
         | sharing. With passkeys, all of that is resolved.
         | 
         | Even if we end up with a system that is the same level of
         | effective client-side security, which is also extremely wrong,
         | the net security of the system will be vastly improved because
         | service providers aren't storing the private key used to
         | authenticate user accounts.
         | 
         | But the client-side security is _also_ substantially improved,
         | because passkeys have much higher phishing resistance.
        
         | jmull wrote:
         | > you cannot make a backup of it
         | 
         | The way this typically works is that the keys are stored in an
         | encrypted file, which can be backed up securely as-is. It can
         | also be copied around and sync'd to other devices.
         | 
         | Of course, this means the authenticator app/service that needs
         | to use the private keys to respond to challenges has to be able
         | to decrypt that file, which means logging in to it.
         | Authenticators balance convenience with security in terms of
         | how often you need to fully log in to it. They are also often
         | configured to require a light-weight authentication on each use
         | (fingerprint, face, pin).
         | 
         | With authenticator apps handling the private keys, secure
         | backups should be easy and automatic. Things should improve
         | since the people using passwords now who don't have a secure
         | automatic backup mechanism for them and switch to passkeys will
         | probably end up with an authenticator that does it
         | automatically.
         | 
         | (Recovery processes will still exist and can still be an
         | issue.)
        
         | Shank wrote:
         | The point of passkeys isn't to be perfect -- the point is to
         | replace passwords, which are already far more imperfect than
         | passkeys. The bonus points with a password is that every site
         | that uses them has to secure them properly and theft of
         | passwords, in plain-text, hashed, etc form is common.
        
           | XorNot wrote:
           | Imagine for a moment that instead of all the time wasted on
           | this, we just implemented a protocol amongst the browser
           | makers which allowed a secure password prompt to be
           | requested, and required strong-hashing before sending
           | anything over the wire?
           | 
           | Which would be easier to use and more effective.
        
             | doodlesdev wrote:
             | If you hash before sending anything over the wire then the
             | hash of your password is now your password, meaning that if
             | it leaks it amounts to basically the same as your password
             | leaking. Granted, applications may choose different hashing
             | algorithms, provide their own clientside salts, etc. which
             | would be really nice. To be fair, I believe more systems
             | should be doing this nowadays, it's really weird to have to
             | send your actual password to the website if a hash would
             | suffice. Then the website could store the salted hash of
             | the salted hash of your password in their database.
             | 
             | Programs such as Bitwarden already do this, where you send
             | the hash of your password to the server instead of the
             | password itself, because from the password you derive the
             | decryption key and you never want that reaching the server.
             | You then use that hashed password as the authorization
             | password, but the client uses the actual password to
             | decrypt the delivered password vault.
        
               | XorNot wrote:
               | If a common browser protocol required the password to be
               | salted with an application supplied value _and_ then
               | rehashed with the domain name it 's served on, there'd be
               | no way to phish a password.
               | 
               | The value the user's browser sends back can't be
               | reversed, so any website prompting from the wrong domain
               | would only ever see an incorrect hash, rather then the
               | cleartext as it does now.
        
           | awaythrow98765 wrote:
           | For an end-user, reliability and ease-of-use trump security.
           | Passkeys are imperfect in the wrong places imho.
        
         | boudin wrote:
         | I find this to be a regression in terms of usability and
         | security as well.
         | 
         | On top of what you mentioned, it also fails really hard when
         | someone has access to you and your trusted device (which will
         | be the smartphone in most cases). It's already an issue
         | allowing easy access to smartphone content, it will extend it
         | to any account using that method of authentication.
        
         | lxgr wrote:
         | What would be a better idea, then?
        
         | Ajedi32 wrote:
         | > Now one could allow backups of a passkey
         | 
         | That's literally part of what makes a passkey a passkey (v.s.
         | just a WebAuthn credential), so that's a given.
         | 
         | > as insecure as a password
         | 
         | No. Passkeys can't be phished, passwords can. Passkeys can't be
         | cracked after a data breach. Passwords can. Passkeys can't be
         | set to something easily guessable. Passwords can. Passkeys
         | can't be written on a post-it note and taped to your monitor.
         | Passwords can. Passkeys can't be reused across multiple sites.
         | Passwords can.
         | 
         | There are _so_ many ways passkeys are superior to user-
         | memorized passwords from a security perspective, it 's
         | laughable to call them "as insecure as a password".
         | 
         | > One could allow multiple instances of authorized passkeys,
         | but those would be even more insecure than passwords, because
         | malicious software on your device could create evil new key
         | instances.
         | 
         | What? Malware stealing your password is "more secure" than
         | malware registering it's own malicious key to each individual
         | site it wants access to?
        
           | awaythrow98765 wrote:
           | > No. Passkeys can't be phished, passwords can. Passkeys
           | can't be cracked after a data breach. Passwords can. Passkeys
           | can't be set to something easily guessable. Passwords can.
           | Passkeys can't be written on a post-it note and taped to your
           | monitor. Passwords can. Passkeys can't be reused across
           | multiple sites. Passwords can.
           | 
           | Passkeys don't need to be cracked after a data breach of your
           | backup provider, they are just usable, right there.
           | 
           | > There are so many ways passkeys are superior to user-
           | memorized passwords from a security perspective, it's
           | laughable to call them "as insecure as a password".
           | 
           | Passkeys are accessible permanently on some devices
           | unencrypted or decryptable in the filesystem, if part of e.g.
           | a backup. Whereas passwords are usually only accessible
           | temporarily. That makes the attack surface top copy over some
           | passkey far larger than for sniffing a password.
        
             | lxgr wrote:
             | > Passkeys are accessible permanently on some devices
             | unencrypted or decryptable in the filesystem, if part of
             | e.g. a backup. Whereas passwords are usually only
             | accessible temporarily.
             | 
             | I think you're mixing up server-side and client/sync-
             | backend-side compromises here.
             | 
             | For the former (i.e. a compromise of hashed passwords and
             | their corresponding salts), you'll need to rotate all
             | passwords since the hashes can be brute-forced. For
             | passkeys, all an attacker gets when compromising a
             | service's database are public keys that can't be brute-
             | forced and key handles that don't give an attacker anything
             | without the corresponding authenticators.
             | 
             | For the latter, the situation is exactly the same for
             | passkeys and passwords in a password manager, i.e. both are
             | as secure as their on-device storage and encryption in
             | transit and rest at a synchronization provider (if any).
        
             | Ajedi32 wrote:
             | You seem to be under the false impression that passkey
             | databases are stored completely unencrypted and unprotected
             | on disk or in the cloud. Obviously those details are
             | implementation-dependent, but I don't know of any passkey
             | implementation that works that way.
             | 
             | Let's take Apple's implementation as an example (since that
             | was the one I could most easily find information on). Their
             | implementation stores passkeys in the iCloud keychain[1],
             | which is end-to-end encrypted[2].
             | 
             | [1]: https://support.apple.com/guide/iphone/sign-in-with-
             | passkeys...
             | 
             | [2]: https://support.apple.com/guide/security/secure-
             | keychain-syn...
        
         | judge2020 wrote:
         | Maybe for browsers on Windows it'll default to storing the key
         | purely on-device, but especially with iCloud Keychain the key
         | is not encrypted by the on-device processor.
         | 
         | This does not make it as "insecure as a password". It does mean
         | you can use root/OS access to exfiltrate keys, but it closes
         | the following security holes that affect passwords:
         | 
         | - keyboard sound-based exfiltration[0]
         | 
         | - visual exfiltration (someone recording you enter your
         | password, or looking over your shoulder and memorizing it)
         | 
         | - credential stuffing, where people who reuse passwords get
         | pwned when the same leaked password is used on other websites
         | 
         | 0: https://www.independent.co.uk/tech/cyber-security-
         | passwords-...
        
       | psanford wrote:
       | I was expecting this also meant that I could add a FIDO2 resident
       | key as a passkey, but the google UI currently does not allow me
       | to do that. That's fairly disappointing.
       | 
       | Its also fairly surprising that desktop UI on linux tells me I
       | can't add passkeys from it. I understand that Chrome isn't
       | planning on supporting platform authenticators on linux, but why
       | can't I add another phone from the desktop with the QR flow?
        
       | jlnho wrote:
       | I enabled passkey and literally nothing changed. Signed out and
       | back in again several times.
        
         | ezfe wrote:
         | Yeah, it's not doing anything for me either
        
           | lars_francke wrote:
           | Doesn't work here either. But I'm on Firefox on Linux, both
           | of which are not yet supported as per the docs.
           | 
           | Firefox might get it around version 120:
           | https://connect.mozilla.org/t5/ideas/support-webauthn-
           | passke...
        
       | hhh wrote:
       | I have used FaceID & TouchID passkeys for a few months now for
       | MFA. I love it, it's the most seamless auth for me thru PingID.
        
       | baryphonic wrote:
       | I don't want to give Google my fingerprint or my face. A password
       | in a password manager + 2FA is fine.
        
         | tallanvor wrote:
         | You're not. You're storing a private key on a device, and using
         | something like a fingerprint or pin to unlock it and use it to
         | authenticate. The fingerprint data is also only stored on the
         | local device.
        
           | awaythrow98765 wrote:
           | Yeah. Except if the usual Qualcom spy chips (also available
           | in Google Pixel) phone home all your biometrics...
        
       | Springtime wrote:
       | _> And, unlike passwords, passkeys are resistant to online
       | attacks like phishing, making them more secure than things like
       | SMS one-time codes._
       | 
       | It's a bit disappointing seeing them re-affirm SMS as a a more
       | vulnerable form for 2FA when Google's stance has been to try and
       | force a phone requirement on Google accounts that lack them in
       | order to login--and then using the phone for SMS 2FA.
       | 
       | In the past number of years only after a phone is attached do
       | other 2FA methods like TOTP become accessible as options.
       | 
       | However even when a phone is added Google continues to utilize
       | SMS 2FA over them for what are deemed important actions like
       | Takeaway or auth keys, in my experience.
       | 
       | This is despite known issues like SIM swapping, lock screen
       | messages (viewable by anyone with device access) and due to the
       | prevailing use of SMS for 2FA users have been prepped to accept
       | security codes via messages which is arguably more exploitable
       | than app-based TOTP in scams where fraudulent messages are known
       | to be used alongside calls to mislead users into gaining trust
       | then subsequently requesting a real 2FA message[1].
       | 
       | [1] https://robertheaton.com/almost-scammed/
        
         | tialaramex wrote:
         | > In the past number of years only after a phone is attached do
         | other 2FA methods like TOTP become accessible as options.
         | 
         | I do always see these comments on HN and I think "Huh, really?"
         | and I go check and, nope, Google doesn't have my phone number,
         | but they _do_ know I have security keys, so that 's all working
         | as intended.
        
           | shortcake27 wrote:
           | I don't have my phone number "registered" with Google. IE it
           | does not appear in my account.
           | 
           | A few years back I was logging into a new machine from a
           | known network. I provided the correct username, password, and
           | TOTP on the first try. Google then forced me to authenticate
           | further by providing my phone number _in the sign in flow_ to
           | receive an SMS. This is pure theatre as I could have provided
           | any number. No security was gained. Google does, however, now
           | have my number. Even if it isn't displayed on my account.
        
       | talkingtab wrote:
       | How does google make money? By having information about users and
       | providing that to people who want to 'target' users. So in the
       | interest of making a 'better' user experience we now have google
       | passkeys. Is Google making this to help users or perhaps does it
       | provide more ability to target users. Hmmm.....
       | 
       | You are not googles customers. Advertisers and other agent
       | wanting to target you are google customers.
       | 
       | Channeling someone, "just say no to google." Or "friends don't
       | let friends use google passkeys".
        
       | rcarmo wrote:
       | I've yet to figure out how passkeys can be useful for someone who
       | switches between multiple devices (and platforms) throughout the
       | day, and who wants to retain control over where tokens are
       | stored. I have switched as many of my MFA credentials as possible
       | to TOTP and have avoided Yubikeys because I don't want to be tied
       | to a single piece of hardware that can be easily lost, or to an
       | identity provided that may decide to lock me out...
        
       | jimmar wrote:
       | The paragraph in the section, "What are passkeys?" tells me that
       | they: are new, are easier, let me use biometrics, and are
       | resistant to attacks. But, it doesn't tell me what passkeys
       | actually are.
       | 
       | Compare passkeys to traditional authentication factors. What's a
       | password? A secret word or phrase that only you know. What are
       | biometrics? Parts of your body that can help uniquely identify
       | you, like your fingerprint or retina. What are hardware tokens?
       | They are physical devices that give you codes that verify that
       | the person logging in has the device on their person.
       | 
       | What are passkeys?
       | 
       | Until they develop a way to explain what passkeys really are, I
       | question how quickly they will be adopted.
        
         | jjav wrote:
         | > Until they develop a way to explain what passkeys really are,
         | I question how quickly they will be adopted.
         | 
         | The article is very frustrating, very long on fluff and no
         | substance.
         | 
         | If anyone has a link to a detailed technical description by an
         | unbiased third-party (not google hawking their lock-in), I'd be
         | very thankful if it can be posted.
        
         | [deleted]
        
         | laegooose wrote:
         | I suspect that one screen comic or a 20 second video could
         | explain it. Instead they give us a wall of text that even
         | technical people can't understand.
        
         | JustSomeNobody wrote:
         | Thank you. I've been trying to figure out what they hell they
         | are and have been unsuccessful. I thought it was just me.
        
           | TulliusCicero wrote:
           | This goes into more detail:
           | https://developers.google.com/identity/passkeys
           | 
           | As far as I can tell: it's a system of private keys stored on
           | devices, in order to transmit a key you also need to unlock a
           | device (e.g. phone) with some other method like a PIN or
           | fingerprint/face scan. Combine those two things and it means
           | a would-be hacker would need both the physical device as well
           | as the local authentication for that device (PIN or
           | biometrics).
        
             | laegooose wrote:
             | Can it be uses on both Android and iOS? What about desktop
             | machines with no fingerprint sensor or faceID?
             | 
             | What happens if user loses the only device on which passkey
             | was enrolled?
        
               | danieldk wrote:
               | In principle it can be synced between any is, it just
               | depends on the cloud/implementation. Eg. 1Password is
               | currently adding Passkey support, that would probably
               | work on any device they have browser plugins and the
               | private key material is stored and synced through
               | 1Password vaults.
        
               | echeese wrote:
               | It can be used on both Android and iOS. Desktop machines
               | can display a QR code which you scan with your device.
               | Passkeys are backed up to the cloud using E2E encryption.
               | If you get locked out of that device, you can do the same
               | thing as when you lose your password.
        
               | ChrisMarshallNY wrote:
               | _> do the same thing as when you lose your password._
               | 
               | If this is a Google Service, then that means begging,
               | pleading, threatening, crying like a baby, then finally
               | posting a rant on HN to get the service unlocked.
        
               | echeese wrote:
               | You could also try your password, I guess.
        
               | lxgr wrote:
               | > Can it be uses on both Android and iOS?
               | 
               | Yes!
               | 
               | > What about desktop machines with no fingerprint sensor
               | or faceID?
               | 
               | You can use a PIN, your login/screen lock password, or an
               | external device offering a fingerprint sensor.
               | 
               | > What happens if user loses the only device on which
               | passkey was enrolled?
               | 
               | You can either sync passkeys to an online account and
               | across multiple devices, or use multiple passkeys stored
               | in multiple physical authenticators.
        
             | [deleted]
        
         | berkle4455 wrote:
         | It's a password that Google controls so when they incorrectly
         | ban you from their services you lose access to literally
         | everything.
         | 
         | Or if you drop your phone in a lake you're out of luck too.
        
           | shadowgovt wrote:
           | It's the second one, not the first one.
           | 
           | The protocol is private key stored on your hardware; public
           | on the service you're authing to. Google doesn't have a way
           | to MITM that, but if you lose the machine storing the private
           | key, best have another way to auth.
           | 
           | (Note: some implementations, including Chrome on Android, do
           | allow sync and sharing of the key, but IIUC even if Google
           | bars you access to your account, the phone will still have
           | the private key and can still do the login).
        
             | yeeeloit wrote:
             | > the phone will still have the private key and can still
             | do the login
             | 
             | One of the main gripes people have is about whether or not
             | the user actually has access to the key or not.
             | 
             | ie. Can I save my passkey somewhere that I control, can I
             | login on another device, etc. etc. Or do I need google's
             | sync/account to do that for me.
        
             | xdennis wrote:
             | > Google doesn't have a way to MITM that
             | 
             | Google controls the software so it can MITM.
        
         | Dalewyn wrote:
         | Passwords will never be supplanted unless the new challenger
         | can satisfy all of the following:
         | 
         | * Easy to understand. (A password is just a word/phrase/string
         | of characters only you know.)
         | 
         | * Easy to use. (Using a password only requires remembering and
         | typing it in when prompted.)
         | 
         | * Convenient. (Only your ability to remember and type required.
         | No other tools or gadgets required.)
         | 
         | * Simple. (All of the above.)
         | 
         | If something needs an essay to describe itself, it's not
         | killing off passwords.
        
           | mrb wrote:
           | Passwords will _never_ be supplanted? As always, it 's a
           | false dichotomy. Passwords will continue to be useful for
           | some scenarios, but in others they will and are being
           | replaced by other methods such as biometrics, U2F tokens, etc
        
           | shadowgovt wrote:
           | I'm actually going to set this up on my mother-in-law's
           | machine next time I see her. She's forever losing her book of
           | passwords, but always has her phone on her.
        
           | augusto-moura wrote:
           | I'm not sure if it is passkeys or other mechanism, but I can
           | easily open my bank account on my Android phone just by using
           | biometrics. Instead of typing a pin or password I just do the
           | biometrics and voila, it opens like magic. That really made
           | me appreciate passwordless apps.
           | 
           | On the other hand, I don't really know how would that work on
           | desktops, should chrome use a Windows service for that? Would
           | it use its own servers? Apple would probably do it
           | themselves. And how about Linux? Would a cross platform
           | option ever exist? Maybe 1password?
        
           | psychphysic wrote:
           | It's also private.
           | 
           | Do you really want your only means of logging into a service
           | identify you because it's also the only way you log into your
           | banking?
           | 
           | And should you want to kill off an identity so you want to
           | have to register everything?!
        
         | mk89 wrote:
         | You need to click on the link that is in the post:
         | https://blog.google/technology/safety-security/one-step-clos...
         | 
         | > Instead, your phone will store a FIDO credential called a
         | passkey which is used to unlock your online account. The
         | passkey makes signing in far more secure, as it's based on
         | public key cryptography and is only shown to your online
         | account when you unlock your phone.
         | 
         | It looks like a token stored on your phone that will be used
         | instead of your password to authenticate.
         | 
         | Apple did something similar:
         | https://developer.apple.com/passkeys/ that is automatically
         | sync-ed in iCloud Keychain, so on every apple device you own,
         | you can use it.
         | 
         | More information here: https://fidoalliance.org/passkeys/ and
         | this explains finally how it works FIDO in general:
         | https://fidoalliance.org/how-fido-works/
         | 
         | So yeah it's _sort of_ a token, but technically, it 's a
         | private key that is used to sign the challenge at login time.
         | 
         | EDIT: from what I understand, while this prevents from
         | "stealing passwords" etc., there is still the risk that someone
         | steals your private key (copy/paste your phone or ... well,
         | steals stuff from iCloud Keychain) and tries to use that to
         | sign the challenge. Did I get it right? Or what mechanism is in
         | place to prevent it? It looks like this time we use biometrics
         | first (to unlock the screen) and passkey later?
        
           | __MatrixMan__ wrote:
           | Why not call it a private key then, we've been handling those
           | since the 70's.
           | 
           | They don't need to be rebranded, they need to be taught in
           | high school with the same words we've always used to talk
           | about them.
        
             | esquivalience wrote:
             | Why not call passwords private words? We've been using
             | words even longer.
             | 
             | The answer is that they're being used to pass an
             | authentication challenge. Pass + key is no different.
        
           | xg15 wrote:
           | I'm not completely sure, but my understanding was that it's
           | basically the same principle as SSH keypairs, with the added
           | twist that the user never gets direct access to the private
           | keys.
           | 
           | The keys are also per-device, so e.g. if you use your Google
           | account from your phone, your laptop and your workplace PC,
           | there would be three public keys associated with your
           | account.
           | 
           | Because the private key (in principle) doesn't ever need to
           | leave the device, it could be stored in a TPM, Secure Enclave
           | or similar chip. The device itself is also supposed to
           | protect the key with some sort of local authentication, i.e.
           | biometrics or a PIN. That stuff only happens locally on the
           | device though and doesn't involve Google's servers in any
           | way.
           | 
           | Consequently, if you want to log in from a new device, you
           | can't just copy over the key, you have to perform some
           | complicated dance where the new device _and an old device
           | that you have already registered_ work together to generate a
           | new keypair for the new device.
           | 
           | If you don't _have_ and old device, e.g. because you 're a
           | non-techie and only ever used your account on your phone and
           | bow your phone just broke? Though luck, I guess?
           | 
           | Same goes for blocking a key: In theory, you can block access
           | for each device individually - however, you need to be able
           | to access your account using one working device in order to
           | do so.
           | 
           | (There is also the hilariously useless flow of "delegating"
           | to a device, for when you're really really really want to
           | check emails from your friend's phone _but also have your own
           | phone right with you in your pocket_. It will not actually
           | help you if you want to check emails from your friend 's
           | phone because you have forgotten your's. This feature sounds
           | a lot like they needed something to respond with if someone
           | asks about logging in from 3rd party devices - without making
           | that usecase actually practical.)
           | 
           | So I guess all that does make stealing the private key
           | somewhat hard: Phishing is out of the question as the user
           | can't access the key even if they wanted to and even if you
           | got hold if the physical device, you'd have to get the key
           | out of the TPM. The bigger problems I see is that your
           | account is now tied to your devices instead of, well, you: If
           | someone steals your phone and manages to guess the PIN or get
           | through the biometric auth, they have instant access to
           | everything. On the other hand, if you have no registered
           | device left, you're effectively locked out of your account.
           | 
           | (All that assuming _if_ passkeys were the only option for
           | logging in. As of now, they still seem to plan with passwords
           | as fallback, so that 's just hypothetical)
        
         | moffkalast wrote:
         | From what I can find the word passkey is just a synonym for
         | password. So yes, none of this makes any sense.
        
           | psychphysic wrote:
           | It makes sense if you want to move from two factor
           | authentication to just the second factor while making it seem
           | new and cool?
           | 
           | It seems to be smoke and mirrors for you register a bunch of
           | TPM/HSM.
        
         | dannyphantom wrote:
         | I'm not sure how it's all that different from Windows Hello.
         | 
         | > Passkeys are easy to set up and let you securely sign in to
         | your Google Account using your fingerprint, face, screen lock,
         | or hardware security key. You can create a passkey on this
         | device, or use another device.
         | 
         | When I press [Continue], Windows Security appears where I can
         | then scan my fingerprint which I already use to sign on.
         | 
         | A single glide of my finger worked as expected and a 'Passkey
         | created' screen appeared with [Done] being my only option to
         | continue.
         | 
         | After a sign out, re-enter of my gmail and these are the next
         | few steps: https://imgur.com/a/heLrUkb
         | 
         | It seems like it just integrates the built-in verification
         | methods depending on what device you are on.
        
         | lxgr wrote:
         | How about: "Passkeys are digital keys that can be securely
         | stored either in a physical device (such as a Yubikey) or in an
         | online account (such as iCloud Keychain or Google Passwords)"?
         | 
         | Thinking about this some more, maybe we should start calling
         | Yubikey etc. keyrings, rather than keys, given that they can
         | store multiple independent passkeys securely?
        
           | JohnFen wrote:
           | Yubikeyrings? I like it.
        
       ___________________________________________________________________
       (page generated 2023-05-03 23:00 UTC)