this post was submitted on 11 Nov 2025
280 points (87.8% liked)
Technology
76839 readers
1479 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Passkeys are cool but you still need 2fa. Which may as well be a passkey itself.
One factor is not great even if it's a passkey.
Isn't this optional? I use passkeys and have yet to be asked for anything else in addition to it.
The passkey is only passed on with an unlocked device. So, if someone stole your passkey device, they can’t copy it and use it without unlocking.
I've only ever seen passkeys used as 2FA, personally.
Really? If I open github (for example) and select passkey login, I just need to press ok using Bitwarden.
Amazon always asked for 2fa and then the passkey pops up but doesn't actually do anything other then tell me I have it enabled
This only applies though if it's a per-device passkey that uses a private key stored securely that cannot be exported.
If the private key can be exported, it can be stolen and the factors becomes invalid.
But people also store their private key in cloud solutions (some here mentioned doing that) which just makes the factor invalid anyway, since then it's not device-bound anymore, and it's the device that verifies your identity with those methods.
Like, what if someone hacks the cloud service storing the passkeys and steals them? Not really any different from storing passwords in a cloud, and that one isn't called 2FA either.
The article is only referring to per device keys and passkeys that lock them on that device. In other words, someone would need to be able to get your device's key, decrypt it or brute your passkey, spoof or steal your device somehow, and send the key under it's identity. I'm sorry, but I don't think the few people that could do that would be wasting their time to do it to little old you. For most people, their insignificance is the best security they have.
Need is a strong word.
2FA is a pretty good idea for some applications and needless hassle for others. I don't need most of my accounts to have 2FA; I use a password manager with strong unique passwords, and for many accounts, having to make a new one would be an inconvenience rather than a tragedy.
Service providers might be motivated to force it on me if stolen accounts could cost them money, but most of them don't need to; it's just the most expedient move for them.
I think most passkey implementations incorporate multiple factors already. The session factor is considered distinct from the device factor, even if it’s all on the same device.
Which isn’t super different from the traditional USB key procedure, where a user would activate a FIDO biometric after clearing an SSO portal, or what have you.
How do you use it then if you need to share access in the whole team?
You don't share your personal password across the whole team now, do you? At least for your teams sake I hope you don't.
You know that not every account is only used by a single user, right?
I think that's the problem right there... If you share accounts across multiple people you have far greater problems than how passkeys work...
Or they're using it as intended. I've had more than one account I've gotten by cost sharing with friends. That's not a problem, that's a solution.
And it only takes one person with a grudge to cause a problem. I have seen it. I have shared accounts but very carefully and if someone abuses it then they permanently lose access to my stuff even if they are family.
We share a password. Then we don't call it a personal password anymore. Was that your question?
That’s an IAM no-no.
So? Read my question above.
You create unique accounts for every team member so that access can appropriately be logged.
Or you implement a PAM tool that logs access and vaults the password and rotates it after use.
So do you think passkeys are not useful at all for me?
That’s not what I said
Then you said useless things only.
Obviously not the personal password, but sometimes you need to share a password. Think about the password for a remote desktop your team may need to connect to for troubleshooting a problem for example.