• Swarfega@lemm.ee
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      2 hours ago

      Indeed. Why so many recommend them I have no idea.

      Honestly, if you have a password manager that supports security keys then buy two cheap keys (one for backup) like the Thetis FIDO U2F Security Key and use those to secure your password vault. For everything else just use TOTP and Passkeys stored in your vault.

      I invested in Yubikeys and yes it was a waste.

      • LordKitsuna@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        2 hours ago

        I’m getting ready to roll them out at work but it’s basically exclusively for the password managers. Having a password manager and every account be unique isn’t helpful if everyone’s going to just use shit passwords for their password manager

        • Swarfega@lemm.ee
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 hour ago

          If they have a security key then fuck it, they can use ‘password’ as a password 😀

  • Boozilla@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    14
    ·
    21 hours ago

    Remember when tap-to-pay was new and didn’t work at a lot of places and some people were freaked out over it?

    And now most of us use it without a 2nd thought.

    I speculate passkeys will be like that.

  • lightsblinken@lemmy.world
    link
    fedilink
    arrow-up
    10
    arrow-down
    1
    ·
    21 hours ago

    sure, you can use a passkey as a primary authentication, but only “a device” or “system”(keypass/1pass etc) knows the passkey detail. with only passkey, if my passkey provider/ device is compromised then everything is lost. having single factor auth seems like a bad idea.

    a password is something that I can know, so is still useful as a protection mechanism. having two factor auth should include password and passkey, which seems entirely reasonable whilst also providing an easier path forward for people used to TOTP.

  • bennypr0fane@discuss.tchncs.de
    link
    fedilink
    arrow-up
    28
    ·
    1 day ago

    Passkeys are one exception to the familiar pattern of “we give you more SeCuRiTY so we can spy on you more and control your behaviour better”. They actually are more secure. Problem is, a lot of technical issues with it still, a ton of stuff not working correctly yet

    • asdfasdfasdf@lemmy.world
      link
      fedilink
      arrow-up
      5
      ·
      edit-2
      24 hours ago

      I’m still appalled that my Yubikey / FIDO2 still doesnt work on Firefox. I have it as a passkey for GitHub, realized it doesnt work on Firefox, so they just prompt me for my password. That seems backwards to have password as a fallback, too.

      • bennypr0fane@discuss.tchncs.de
        link
        fedilink
        arrow-up
        1
        ·
        19 hours ago

        I’m also having problems using passkeys (stored in Bitwarden) with Github in Firefox. It keeps prompting me to touch the security key, which I don’t have, so I plain can’t use a passkey for Github. Works perfectly for Google though

  • nimble@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    25
    arrow-down
    1
    ·
    1 day ago

    On the contrary i want more services using passkeys instead of 2fa methods that are less secure (sms).

  • powermaker450@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    17
    arrow-down
    1
    ·
    1 day ago

    Unless I’ve missed something big, passkeys are pretty easy for me if the website supports them imo.

    Using KeePassXC, I click register on the website, register the passkey with KeePass, then it just works when I need to authenticate or login. My database is then synced across all my devices.

    Passkey support is yet to come to KeePassDX on Android though, so I’ll be awaiting that feature

  • whoisearth@lemmy.ca
    link
    fedilink
    arrow-up
    7
    arrow-down
    2
    ·
    edit-2
    5 hours ago

    I’ll use banks as an example

    If they cared about your security there would not be a mobile app or website.

    Hell, credit cards would still require a signature.

    It’s about cost first and foremost and then convenience.

    Has nothing about you as a consumer. They don’t give 2 shits about you as a consumer.

    • throwback3090@lemmy.nz
      link
      fedilink
      English
      arrow-up
      7
      ·
      8 hours ago

      I mean you’re right about banks but your examples make no sense.

      Banks generally don’t support 2fa, which is bad. Some banks (fidelity) still have character limits on passwords because they stores it in plaintext until recently so you could use it through the telephone system. They could implement a secure tap to pay system on your phones with enhanced security, rather than relying on Google to handle their job. And for credit cards themselves, switch to chip and pin.

      “Banks don’t have mobile apps”?? “Signatures are secure”???🤡

      • whoisearth@lemmy.ca
        link
        fedilink
        arrow-up
        1
        ·
        5 hours ago

        How easy is it to fake a signature for a normal person who has not practiced a person’s signature for the intent purpose of faking it? Have you ever tried faking your parents signature to get out of school? I have.

        Now the infrastructure required to adequately check signatures is not practical hence it doesn’t exist. It’s why we moved to pins. Pins are small and 2fa doesn’t exist for banks because again it’s about the bare minimum and they are out to make money and don’t care about customers plus there’s government safeguards in place specific to banking.

        I will continue to argue that going back in time signatures are infinitely more secure than a 4 digit pin let alone tap but we have traded security for convenience.

        Anyways full admit that I’m batshit crazy.

        • candybrie@lemmy.world
          link
          fedilink
          arrow-up
          1
          ·
          edit-2
          3 hours ago

          Have you ever tried faking your parents signature to get out of school? I have

          Yeah. I’ve been able to do it since I was 10. It’s really easy. I can also fake my husband’s and siblings’. It’s also a pain in the ass to change your signature. So if someone learns to copy it (like say based on the signature that was literally required to be on the card), it’s much hard to change it compared to a pin (which should definitely not be written on the card).

    • candybrie@lemmy.world
      link
      fedilink
      arrow-up
      13
      ·
      21 hours ago

      Do you think signatures were at all secure? If they cared about security they’d do chip+pin like most civilized countries.

      • whoisearth@lemmy.ca
        link
        fedilink
        arrow-up
        1
        ·
        5 hours ago

        With proper infrastructure yes signatures are extremely secure. But that proper infrastructure doesn’t exist.

        • candybrie@lemmy.world
          link
          fedilink
          arrow-up
          1
          ·
          edit-2
          3 hours ago

          I struggle to think of what that extremely secure infrastructure would look like. Are you imagining signing on an electric terminal and having a computer compare signatures at the time of sale? That seems like the most secure and still wildly insecure compared to a pin.

  • darvit@lemmy.darvit.nl
    link
    fedilink
    arrow-up
    24
    arrow-down
    2
    ·
    1 day ago

    ITT: people who think only SMS, email and TOTP exist as 2FA.

    And people who think only your phone can be used as passkey.

    • ArcaneSlime@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      7
      ·
      edit-2
      1 day ago

      When those are the only options given by some services, yeh it kinda is. I’d love to be able to just use my flipper as a u2f for everything, but unfortunately most websites are all “no” and you have to use a chrome browser instead of Librewolf even when you could use a yubikey, so fine I guess text me, oh whoops I changed my number and I’m now locked out of my acct, cool.

    • Swarfega@lemm.ee
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      2 hours ago

      And how many sites support Yubikeys/Security Keys? Not many. I doubt we’ll see more either now with Passkeys becoming more prominent.

      I have two Yubikeys and other than securing my password manager vault they are rarely used elsewhere.

      • null_dot@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        9 hours ago

        I don’t think that’s true.

        You can store them in keepassxc which can be accessed with a password.

        I think it’s “have” + “know” or “are”.

        So you have the device with the passkey, and know the unlock pin or are the person with the biometrics.

      • bitwolf@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 day ago

        How i interpretted it is that the biometrics provide access to the tpm which is like a built in yubikey you “own”.

    • jj4211@lemmy.world
      link
      fedilink
      arrow-up
      5
      ·
      1 day ago

      Of course, yubikeys implement passkey… Passkey is the new buzzword after lackluster success with the words used, webauthn…

      • Swarfega@lemm.ee
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 hours ago

        25 passkey limit on my Yubikey. I have to buy a new one, with the exact same hardware, just to get the latest firmware that allows 100 passkeys. No thanks.

      • bearboiblake@pawb.social
        link
        fedilink
        English
        arrow-up
        3
        ·
        1 day ago

        and thank god for that, i’d been saying for years, webauthn is great tech which will never be adopted by normal people, because it had an awful name. luckily we were able to just call OATH TOTP “two factor authentication” or that would have been totally DOA too. I got big hopes for passkeys!

  • Katana314@lemmy.world
    link
    fedilink
    English
    arrow-up
    39
    arrow-down
    2
    ·
    2 days ago

    There’s been a lot of pain in the attempt to portray it as “Just click the passkey button, and that’s it! Your login is secured for life!”

    No - Buddy. It is secured for this one specific device that I have biometric authentication for. What about my computer? What about my other computer that isn’t on the same operating system? I have a password manager that stores these things, why didn’t you save to that when I registered? Why is it trying to take this shit from my Apple Keychain when it’s in Bitwarden?

    And, the next ultra-big step: How would a non-techie figure this shit out?

    • candybrie@lemmy.world
      link
      fedilink
      arrow-up
      2
      arrow-down
      1
      ·
      10 hours ago

      And, the next ultra-big step: How would a non-techie figure this shit out?

      They don’t have a computer, another computer with a different OS, or bitwarden.

    • I Cast Fist@programming.dev
      link
      fedilink
      arrow-up
      1
      ·
      22 hours ago

      And, the next ultra-big step: How would a non-techie figure this shit out?

      They wouldn’t, because the people calling the shots in the tech world create UX with a focus on it sucking for everyone

    • lmmarsano@lemmynsfw.com
      link
      fedilink
      English
      arrow-up
      4
      ·
      1 day ago

      For some people it is that easy.

      When it is saved to a cross-platform password manager, it is secured on all devices that password manager runs on including your computer on other operating systems. You can also choose other in the OS prompt & redirect to a device with your passkey or use a hardware security key (I don’t). If your preferred password manager isn’t the primary one on all your devices, then fix that or use the other option mentioned before.

      How would a non-techie figure this shit out?

      The same way they figure out passwords & multifactor. Their pain isn’t ours for those who’ve figured this out & have a smooth experience.

      • Katana314@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 day ago

        I mentioned Bitwarden in my comment, and my frustration specifically comes from occasions that I had Account X ready in Bitwarden, started up an app that relied on Account X, but loaded an HTML login page that had no discernable controls to use that Bitwarden passkey; expecting entirely for it to exist in my Apple keychain, which I never use.

        I think it’s very easy to claim this specific app / account was not implementing passkeys well. But if that’s the case, how can I guarantee any other accounts I move over won’t fuck it up somewhere? I haven’t seen anyone get the concept of passwords wrong, and even if they don’t understand how managers work, I have control of the copy-paste function and can even type a password myself if needed.

        • lmmarsano@lemmynsfw.com
          link
          fedilink
          English
          arrow-up
          1
          ·
          22 hours ago

          loaded an HTML login page that had no discernable controls to use that Bitwarden passkey; expecting entirely for it to exist in my Apple keychain, which I never use

          I use Bitwarden, yet not macOS/iOS. Whenever a passkey dialog from the wrong authenticator comes up, I choose option other to redirect to a device running Bitwarden: I see macOS & iOS offer similar controls. However, Bitwarden’s passkey dialog (section with links to configuring that) usually pops up, so that isn’t necessary.

          But if that’s the case, how can I guarantee any other accounts I move over won’t fuck it up somewhere?

          Save a recovery code in Bitwarden (add field type hidden named Recovery code to the login entry)? That’s standard practice for me, though I’ve never needed them.

          I haven’t seen anyone get the concept of passwords wrong

          I have control of the copy-paste function and can even type a password myself if needed

          I’ve seen forms disable paste. Much can go wrong with passwords. Passwords require sharing & transmitting a secret (a symmetric key), which either party can fail to secure. Passkeys, however, never transmit secrets. Instead, they transmit challenges using asymmetric cryptography. The application can’t fail to secure a secret it never has. Far more secure, and less to go wrong.

          The password field is a more manual, error prone user interface. With passkeys/WebAuthn, you instead supply a key that isn’t transmitted: easier than passwords when setup correctly, & nothing to do until it’s setup correctly.

          Similar situation with ssh: though it can accept passwords, ssh key authentication is way nicer & more secure.

    • I use both Bitwarden and Apple’s native Passwords.app and just save a passkey for each app. Usually you can name the passkey on the website/in the app as well.
      This is also the system I use when saving 2FA TOTP codes as well so I guess I’m used to it, but it makes good sense to me to have reduncancy in my password apps. Also I lock up *the apps themselves* with passkeys in the respective app for ease of use.
      :mastozany:

    • jj4211@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      1 day ago

      This was roughly the state of affairs before but the state of things have relented where software password managers are now allowed to serve the purpose.

      So if a hardened security guy wants to only use his dedicated hardware token with registering backups, that’s possible.

      If a layman wants to use Google password manager to just take care of it, that’s fine too.

      Also much in between, using a phone instead of a yubikey like, using an offline password manager, etc.

    • BorgDrone@lemmy.one
      link
      fedilink
      arrow-up
      6
      arrow-down
      3
      ·
      2 days ago

      No - Buddy. It is secured for this one specific device that I have biometric authentication for. What about my computer? What about my other computer that isn’t on the same operating system?

      Then use a Yubikey.

      • MDCCCLV@lemmy.ca
        link
        fedilink
        English
        arrow-up
        4
        ·
        1 day ago

        I tried a yubikey but most websites want you to use the pin for that which requires windows hello, and if you reset windows you lose that.

      • HelixDab2@lemm.ee
        link
        fedilink
        arrow-up
        1
        ·
        1 day ago

        OnlyKey seems to be a better choice than Yubikey, from what I can see. The only reason I haven’t switched is that I have a few accounts that I share with my partner, and I want to be sure that I can have two different keys work for the same account.

        • Manalith@midwest.social
          link
          fedilink
          arrow-up
          1
          ·
          1 day ago

          I just looked over their site and other than a physical pin, it looked basically the same to me. Can you tell me what seems to be better? Only issue I’ve ever had with Yubikey was NFC use to log into Bitwarden, but I think it was user error.

  • tabularasa@lemmy.ca
    link
    fedilink
    arrow-up
    56
    arrow-down
    1
    ·
    2 days ago

    The amount of people in this thread that don’t understand passkeys surprises me. This is Lemmy. Aren’t we the technical Linux nerds of the Internet?

    • areyouevenreal@lemm.ee
      link
      fedilink
      arrow-up
      6
      arrow-down
      1
      ·
      edit-2
      1 day ago

      You understand that technical people often are the least likely to trust new technology and are often stuck in the mud when it comes to technology? Doubly so if you are anti-corporation. It seems anything that isn’t the Unix way of doing things can be questioned.

      There is a good meme about people who love technology vs people who actually work with the stuff. The former using IoT devices to turn their lights on while the latter uses a light switch and has a gun in case the printer starts making weird noises.

      • I Cast Fist@programming.dev
        link
        fedilink
        arrow-up
        1
        ·
        22 hours ago

        It seems anything that isn’t the Unix way of doing things can be questioned.

        I think Unix is the thing that indirectly gets questioned most often, because everyone wants to be on the “right” side of how to unix things (see latest rust in kernel for a very recent example). When I think about it, unix alone feels like a recurring xkcd standards comic

    • Maggoty@lemmy.world
      link
      fedilink
      arrow-up
      13
      arrow-down
      1
      ·
      2 days ago

      2FA is just dead simple. I contact you, you contact me, handshake achieved. If you call me out of the blue I raise the alarm. If you get a login attempt with a failed handshake you raise the alarm.

      Putting it all behind a pop up screen just isn’t trustworthy to the human brain.

      • bearboiblake@pawb.social
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        1
        ·
        1 day ago

        TOTP 2FA is less secure than passkeys. 2FA TOTP keys can be phished. Passkey authentication cannot be phished. This is a security improvement which can make people completely immune to phishing attacks. That’s huge. And it doesn’t have any privacy risks, no loss of anonymity. It’s an open standard.

        This is, objectively, a rare example of new technology which will make the world better and safer for us.

        • Tiger@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          3
          ·
          1 day ago

          But I also worry about new areas of weakness with passkeys - anyone accessing the device with the passkey on it, or hacked that device, gets access automatically to the accounts. Also if logins are too fluid I worry that anything out of the ordinary during sign ins won’t be noticed.

          • bearboiblake@pawb.social
            link
            fedilink
            English
            arrow-up
            3
            ·
            edit-2
            1 day ago

            yeah that’s totally true, but usually modern devices ensure that the passkeys are protected with a PIN or some biometric security, so I think it’s at least as strong as having a password manager on your device that can be unlocked with a PIN.

            not really sure what you mean about “out of the ordinary” logins - it sounds like you’re thinking about phishing risks? but remember - passkeys cannot be phished. they verify the identity of both sides of the authentication token exchange - the server verifies you, and you verify the server. If you only use passkey authentication, you are safe from being phished. the most secure system would be one entirely without passwords/oath totp

            • Tiger@sh.itjust.works
              link
              fedilink
              English
              arrow-up
              1
              ·
              21 hours ago

              I guess I mean if people are too used to critical services opening up without any friction, a pause to complete some sign in step, they’ll stop taking a moment to look for any warning signs, so they might miss the fact that they’re at a spoofed url, for example. Yes you’re right that the passkey wouldn’t be working at this fake site, but it could still take them out and harvest some data, interactions or credentials.

          • bearboiblake@pawb.social
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 day ago

            everyone is sick and tired of tech promising to make the world better, only to make everything worse. i totally get the mistrust, the feeling that this is probanly just another trick from big corporations to steal even more of your privacy. i know much better than most people what it’s like. i know you’ve got no real reason to believe me, i’m just a random silly gay furry boy, but, trust me, in this case, we should be adopting this tech. if you’ve got family members or friends who are more vulnerable to phishing scams - often scammers target the elderly - i’d really encourage you to encourage them to set up passkeys. as always, i strongly recommend bitwarden - it can manage passkeys and sync them between devices and it’s totally secure and open source.

            much love & solidarity!

            • Maggoty@lemmy.world
              link
              fedilink
              arrow-up
              1
              ·
              23 hours ago

              First, I love your self description. But second, I’m not trying to say I’m not on board. I should have been more clear, I was simply trying to answer why more people are not on board.

      • lmmarsano@lemmynsfw.com
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        2
        ·
        edit-2
        1 day ago

        Passkey is multifactor: something the user has (key), something the user is (biometric) or knowns (password) to unlock the key. Yes, dead simple.

      • HelixDab2@lemm.ee
        link
        fedilink
        arrow-up
        3
        arrow-down
        4
        ·
        1 day ago

        2FA is great, right up until you’re also the victim of a sim swap attack.

        • WhatAmLemmy@lemmy.world
          link
          fedilink
          English
          arrow-up
          6
          ·
          edit-2
          1 day ago

          2FA is not SMS. SMS is the least secure, shittiest, and simplest form of 2FA, designed as the bare minimum for the average chucklefuck. Everywhere implemented it hastily because the average idiot still uses the same password for everything. It should be illegal as the only form of 2FA, but our governments are run by criminally corrupt dinosaurs.

          Fun story! Back in 2017 I tried to remove SMS 2FA entirely, and switch to a data only mobile service. I use 2FA everywhere it’s available, but was able replace SMS with TOTP everywhere except banks, even on big tech platforms where you could only activate TOTP after adding a mobile number and enabling SMS 2FA (you could then remove the mobile number). I ultimately had to keep the voice service because banks required SMS 2FA, with no alternatives beyond their own custom 2FA apps, that can only be registered by SMS. Almost a decade later I have more SMS 2FA than ever before.

          The moral of the story is we live in a clown world capitalist dictatorship.

    • Natanael@infosec.pub
      link
      fedilink
      arrow-up
      6
      ·
      2 days ago

      The synchronization part is the annoying part. And when you have multiple accounts on one site you can end up with multiple passkeys for it.