• Big Tech has implemented passkeys in a way that locks users into their platforms rather than providing universal security
  • Passkeys were developed to replace passwords for better account security, but their rollout by Apple and Google has limited their potential
  • Proton Pass offers passkeys that are universal, easy to use, and available to everyone for improved online security and privacy.
  • Irdial
    link
    fedilink
    English
    56
    edit-2
    8 months ago

    Better yet: use a hardware 2FA token that supports passkeys

      • @[email protected]
        link
        fedilink
        English
        228 months ago

        How is 25 bad? Do you need a passkey for each service /app/website? Can’t you use the same key for many services? (trying to understand how they work)

        • BlackEco
          link
          fedilink
          English
          368 months ago

          Yes, you need a passkey per service, so you would quickly end up with your 25 slots full.

        • lemmyvore
          link
          fedilink
          English
          198 months ago

          Ideally yes, they’re supposed to eventually replace all passwords. Of which I have hundreds. And yes not 100% of them will do that on the near future but a lot more than 25 will.

        • @[email protected]
          link
          fedilink
          English
          98 months ago

          I have 150 passwords in my password manager. I’m not buying 7 YubiKeys (and to be fair that’s not what they’re designated for)

          • capital
            link
            fedilink
            English
            48 months ago

            Being down-voted for asking questions is bullshit. Your questions are valid and those people suck.

        • @[email protected]
          link
          fedilink
          English
          68 months ago

          No, sharing passkeys across services is way too risky. One service gets compromised, someone gets your passkey, and then they have access to all of your services. It’s the same principle with regular passwords.

          • @[email protected]
            link
            fedilink
            English
            88 months ago

            Uh, each service only has access to your public key, not the private one that stays with you. It’s less risky than a regular password.

            Even with U2F hardware keys where the server-side stores the encrypted key (to allow for infinite sites to be used with a single hardware key), it’s only decryptable on your key and thus isn’t that useful for someone who has compromised a service.

            • @[email protected]
              link
              fedilink
              English
              4
              edit-2
              8 months ago

              Thanks. I’m still learning about this “new” technology (which already is, what, eight years?)

        • paraphrand
          link
          fedilink
          English
          38 months ago

          Having a key shared across sites wouldn’t be great. If it was great it would be an article talking about “passkey” not “passkeys” because you would just have one. Like some sort of Skeleton Passkey that unlocks all your shit when compromised.

          • lemmyvore
            link
            fedilink
            English
            28 months ago

            That’s impossible. Passkeys were designed specifically to be impossible to share across different websites.

            • paraphrand
              link
              fedilink
              English
              7
              edit-2
              8 months ago

              Well, that’s basically my point. It’s not a good idea.

        • Natanael
          link
          fedilink
          English
          38 months ago

          You only need one per website if you want it to autofill the username, because resident keys held on the security token can be recognized and suggested automatically but otherwise you must first enter your username on the website and let the website send its challenge value for the corresponding domain and account pair so that your security token can respond correctly.

      • m-p{3}
        link
        fedilink
        English
        58 months ago

        It depends on the passkey type (resident vs non-resident keys)

        • BlackEco
          link
          fedilink
          English
          48 months ago

          Right, now I remember reading about that, I forgot.

        • @[email protected]
          link
          fedilink
          English
          3
          edit-2
          8 months ago

          Passkey = Resident Key

          Nonresident keys are not passkeys, they are solely a second form of authentication meaning the service you are logging into still requires a password.

          • @[email protected]
            link
            fedilink
            English
            18 months ago

            Couldn’t a site theoretically use a nonresident key with just a username, in place of a password?

            This seems to imply it might be possible:

            https://developers.yubico.com/WebAuthn/WebAuthn_Developer_Guide/Resident_Keys.html

            Discoverable Credential means that the private key and associated metadata is stored in persistent memory on the authenticator, instead of encrypted and stored on the relying party server. If the credentials were stored on the server, then the server would need to return that to the authenticator before the authenticator could decrypt and use it. This would mean that the user would need to provide a username to identify which credential to provide, and usually also a password to verify their identity.

            • @[email protected]
              link
              fedilink
              English
              1
              edit-2
              8 months ago

              For sure, but that still isn’t a passkey. The method you are talking about is the equivalent of non-passphrase protected SSH protocol, which is a single form of authentication (i.e. if someone has your security key they have your account).

              The term passkey implies MFA: having a physical key and a password, a physical key and a fingerprint scan, or equivalent.

              Sure the username could be considered the password, but usernames are not designed to be protected the same way. For example, they typically are stored in clear text in a services database, so one databreach and it’s over.

    • Dark Arc
      link
      fedilink
      English
      28 months ago

      Eh… That’s not exactly a silver bullet or necessarily “way better”; it’s got a lot of usability issues.

      You really only want to do that for your most important sites and then you want to use multiple passkeys to make sure you retain access.