this post was submitted on 11 Oct 2023
292 points (98.0% liked)

Technology

59299 readers
4838 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Passkey is some sort of specific unique key to a device allowing to use a pin on a device instead of the password. But which won't work on another device.

Now I don't know if that key can be stolen or not, or if it's really more secure or not, as people have really unsecure pins.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 33 points 1 year ago (3 children)

Nope. Not going to have my entire digital everything depend on me not losing or breaking a single electronic device.

[–] [email protected] 21 points 1 year ago (1 children)

From Ricky Mondello, who works on passkeys at Apple: “If it’s device-bound, it’s not a passkey”:

https://hachyderm.io/@rmondello/111188643228872151

[–] [email protected] 1 points 1 year ago (1 children)

That's a terrible take ... He's confusing "what it does and how it works" with "how you manage it".

It's like saying "don't call it a password if you write it down". It's confusing and unhelpful.

[–] [email protected] 8 points 1 year ago (1 children)

No it's literally in the spec. Passkeys are designed for cross device synchronization. You have to go out of your way to make it local only (or use a different webauthn spec like physical security keys)

[–] [email protected] 2 points 1 year ago (1 children)

They're just private keys. By nature you can copy them wherever you want. I guess I don't know why he's making that distinction at all.

[–] [email protected] 4 points 1 year ago

The original spec is resident keys including TPM protected or hardware token protected keys designed to be impossible to copy. That's why there's a distinction.

[–] [email protected] 12 points 1 year ago* (last edited 1 year ago) (2 children)

You won't need to?

The key is for a single device. Logging in on another one is going to generate another key.

They key is secured with the pin of the device, so when you try to log in, you can use the pin to log in, and not the password.

https://youtu.be/6lBixL_qpro?si=wFFQwrfjQBKDHs5B

[–] [email protected] 9 points 1 year ago (1 children)

Would you have to set up multiple devices when making your account then, if you wanted more than just your phone?

[–] [email protected] 3 points 1 year ago (1 children)

Yes. Unless there was a way to share that key between devices. I know Bitwarden is working on a vault for keys but it's not released yet. It was due out now so I assume it's delayed.

[–] [email protected] 2 points 1 year ago

Apple is quite dogmatic in that their implementation demands cross device syncing.

It's definitely possible to have such an implementation and those will be the most common. You take a very small security risk for a huge convenience factor.

For the more paranoid, device-bound passkeys do not sync. If you lose the device, you will need to go through a recovery procedure.

[–] [email protected] 2 points 1 year ago

Thanks for posting this video. Very good explanation for those unfamiliar with the technology.

[–] [email protected] 9 points 1 year ago (3 children)

Do you not use MFA at all then?

[–] [email protected] 7 points 1 year ago (1 children)

Authy on the phone while also using their desktop app. If you lose the phone you still have options.

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago) (1 children)

Each to their own but cloud syncing and MFA are a bad mix in my eyes. It has a "who watches the watchmen" problem and it somewhat defeats the point of having a trusted factor when you have an untrusted one on "someone else's computer".

Authy have demonstrated why this is a problem (https://techcrunch.com/2022/08/26/twilio-breach-authy/), plus they're closed source, so it's a big no from me.

[–] [email protected] 4 points 1 year ago (1 children)

Vaultwarden, a FOSS Bitwarden server compatible with upstream clients, is able to store TOTP, and when self hosted, you are the watchmen.

[–] [email protected] 2 points 1 year ago

Yeah, this is fine. It's closed source, opaque cloud solutions that people should be wary of.

[–] [email protected] 5 points 1 year ago (1 children)

I have the KeepassXC database with the TOTP thoroughly backed up, so nope.

[–] [email protected] 1 points 1 year ago

So you are using MFA but for the password manager? (Appreciate that you're not the OP I was asking)

[–] [email protected] 5 points 1 year ago (1 children)

If your MFA is bound to a single device and you have no backup then you're doing it wrong.

[–] [email protected] 3 points 1 year ago (1 children)

You can accuse companies of doing it wrong by often only providing a single additional factor, but I don't see what that has to do with me.

What I'm hearing is that when an authenticator app is the only option, you'll go with nothing over something.

Perfection is the enemy of good after all.

[–] [email protected] 2 points 1 year ago (1 children)

Looks like I replied to the wrong comment.

The person you had replied to originally commented on not wanting to have the possibility of everything being broken by losing a single device. I think that's important that everyone realize that some sort of a backup plan is needed, whether that be back up codes, saving the original QR code, or being able to use multiple devices to authenticate.

At any rate, I should have replied to someone else. Sorry for any confusion.

[–] [email protected] 1 points 1 year ago

No harm, no foul.

And you're very much right. There's a growing problem in consumer perceptions of modern security methods and how they should be applied. Much more time is spent justifying the convenience of proposed solutions, and not nearly enough time spent understanding what the scope is of the attack vectors that lead to these things needing to exist in the first place.

And further, why some of these conveniences - much like the reused-everywhere super-long password of yesteryear - are a danger in themselves.