this post was submitted on 11 Nov 2025
280 points (87.8% liked)

Technology

76839 readers
1909 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Passkeys are built on the FIDO2 standard (CTAP2 + WebAuthn standards). They remove the shared secret, stop phishing at the source, and make credential-stuffing useless.

But adoption is still low, and interoperability between Apple, Google, and Microsoft isn’t seamless.

I broke down how passkeys work, their strengths, and what’s still missing

top 50 comments
sorted by: hot top controversial new old
[–] Brokkr@lemmy.world 207 points 5 days ago (23 children)

While the lock-in issue is annoying and a good reason not to adopt these, the device failure issue is a tech killer. Especially when I can use a password manager. This means I can remember two passwords (email and password manager), make them secure, and then always recover all my accounts.

Passkeys are a technology that were surpassed 10 years before their introduction and I believe the only reason they are being pushed is because security people think they are cool and tech companies would be delighted to lock you into their system.

[–] hansolo@lemmy.today 91 points 5 days ago (1 children)

This is the only accurate take in the whole thread.

Passkeys solve "well, can't be fished" by introducing 2 new problems and never resolving super prevalent session hijacking. Even as a basic cost-benefit analysis, it's a net loss to literally everyone.

load more comments (1 replies)
[–] smiletolerantly@awful.systems 33 points 5 days ago (7 children)

You can store Passkeys in open source password managers.

I don't know most of my passwords, so the step to passkeys doesn't feel like a big one. I also really like the flow of pressing Login; Bitwarden pops up a prompt without me initiating it; I press confirm. Done, logged in, and arguably more secure due to the surrounding phishing and shared secrets benefits.

[–] Brokkr@lemmy.world 28 points 5 days ago* (last edited 5 days ago) (2 children)

Sure, they probably work great when you have your *passkey manager on the device, but that's not when I need to have backup routes into my accounts. When using a new device, or someone else's, having even a complicated password that can be typed or copied-pasted has way more functionality.

As far a I can tell, using passkeys would only risk locking me out of my accounts. Everyone else is already effectively locked out.

[–] smiletolerantly@awful.systems 11 points 5 days ago

I can access my password manager via the browser from any device.

load more comments (1 replies)
load more comments (6 replies)
[–] 4am@lemmy.zip 32 points 5 days ago (1 children)

Password managers store passkeys. They’re portable and not device-locked. Been using them on Bitwarden for like 2 years now.

load more comments (1 replies)
[–] l_b_i@pawb.social 27 points 5 days ago (1 children)

I think they are being pushed because cool technology on paper. Whenever I read an article about them, I can't help but think about the human factors. How are passkeys created, often by a password or email. okay... that looks a lot like a password. Oh you lost the passkey, here lets send you one again. It stinks of a second factor without a first. Sure, the passkey itself is hard to compromise, but how about its creation. If your email is compromised I see no difference from passwords or passkeys.

[–] 4am@lemmy.zip 14 points 5 days ago (5 children)

They don’t email you a passkey, what are you even talking about?

load more comments (5 replies)
load more comments (19 replies)
[–] kjetil@lemmy.world 104 points 5 days ago (15 children)

The biggest disadvantage:

Disadvantages of Passkeys

Ecosystem Lock-In – Passkey pairs are synced through each vendor’s respective clouds via end-to-end encryption to facilitate seamless access multiple devices.

More eggs in the American megacorp basket for more people, yay

[–] Doccool@lemmy.world 38 points 5 days ago (4 children)

Currently I use a FOSS (I think?) password manager, BitWarden, that supports passkeys. I use it across Mac, Windows and Android so I'm while my passkeys are locked yo the password manager, I am not locked to any of the aforementioned megacorps.

[–] SkaveRat@discuss.tchncs.de 21 points 5 days ago (2 children)

While I use and love bitwarden, it's not exactly foss. Although there is a foss implementation of their server backend

[–] AbidanYre@lemmy.world 27 points 5 days ago

Vaultwarden (the free server implementation) also supports passkeys.

load more comments (1 replies)
[–] Septimaeus@infosec.pub 12 points 5 days ago

KeePassXC has begun rollout of their own implementation, and I’m pretty sure they’re considered FOSS.

From a quick scan of the white paper, it appears they’re currently using on-device passkey discovery and otherwise “intercepting” passkey registration workflows, which I take to mean they aren’t originating the request as a passkey registrar. This may be the easiest method to satisfy FIDO’s dID requirements.

[–] kjetil@lemmy.world 10 points 5 days ago

I use BitWarden too. OS , device and browser agnostic is a win

But I imagine the vast amount of people will use whatever their platform is pushing, so Apple Google or Microsoft. And in 5 years time "3rd party passkeys" are not "secure enough" and blocked by the OS. (Ok that's a bit tinfoil hat, but Google's recent Android app developer verification scheme is fresh in mind)

load more comments (1 replies)
load more comments (14 replies)
[–] ICastFist@programming.dev 63 points 5 days ago (8 children)

Better title:

Passkeys: still trying to explain why it's worth the hassle when it isn't

load more comments (8 replies)
[–] HulkSmashBurgers@reddthat.com 56 points 5 days ago (3 children)

The eco-system lock-in makes this a non-starter for me. If I could store the private keys in something like a keepass vault (or that) and do the authentication magic from that I would consider it.

[–] cmhe@lemmy.world 17 points 5 days ago* (last edited 5 days ago) (2 children)

You can? At least I do that. I host vaultwarden myself and store the passkeys there.

Passkeys to me are just a better way to autofill in login data.

[–] barryamelton@lemmy.world 18 points 5 days ago (3 children)

OK, now think how nontechnical people will not be able to do it. They will be tied to Google/X-corp for all credentials, even government ones. Waiting to be banned if their social credit is too low.

[–] frezik@lemmy.blahaj.zone 16 points 5 days ago

That's the root of the problem. Nontechnical people don't use good passwords, but all the ideas we have for replacing them are only usable by more technically minded people.

There are a variety of other reasons why passwords are bad, though.

load more comments (2 replies)
load more comments (1 replies)
load more comments (2 replies)
[–] Engywuck@lemmy.zip 33 points 5 days ago (1 children)

No, thanks. I'll keep using password+2FA and I hope that passkeys never become "mandatory".

[–] TotalCourage007@lemmy.world 11 points 5 days ago (4 children)

Thanks to our dystopian hellscape we live in it'll become mandatory just like useless online ids. I hate having to explain passkeys to my family. Some fuckface suit who doesn't use it properly pushed for a portfolio addition.

load more comments (4 replies)
[–] laranis@lemmy.zip 28 points 4 days ago (5 children)

Why do you have the 4-digit PIN? Well, it’s just to unlock the part of your device where the private key is stored.

And there is the problem I have with passkeys. With a password it is me authenticating to the service I'm using. Pretty straight forward (if you ignore the operating system, web browser, network protocols, etc., but that's part of using the tech).

With passkeys you've got this third party storing your keys that increases your attack surface. It could be your web browser, your OS, or some cloud provider that you're now relying on to keep your data safe. I get that for people whose password is "password123" or who aren't savvy enough to avoid phishing maybe this helps. But with decent opsec this overly complicates authentication, IMO.

To my point, later in the article:

Securing your cloud account with strong 2FA and activating biometrics is crucial.

What's that now? The weak point is the user's ability to implement MFA and biometrics? The same users who couldn't be bothered to create different passwords for different sites? You see how we've just inserted another layer into the authentication process without solving for the major weakness?

With my tinfoil hat on I suspect this push toward passkeys is just another corporate data and/or money grab -- snake oil for companies to get their tentacles tighter around your digital existence.

Happy to be proven wrong.

[–] Evotech@lemmy.world 11 points 4 days ago* (last edited 4 days ago)

Passkeys can't be phished.

That's the main point.

Phishing is a reeeeal pain. And something that needs to be solved. Not through training but with technology.

[–] needanke@feddit.org 10 points 4 days ago* (last edited 4 days ago)

How do you currently store your passwords? I would also consider that a third party with an adittional atack surface if you are considering the passkey location one.

Also your argument

(if you ignore the operating system, web browser, network protocols, etc., but that's part of using the tech).

is faulty. That is because passkeys exist in part to mitigate those atack vectors. Mitm, a compromised browser or client, etc. is less of an issue with passkeys. The information transmitted during an authentication can not be reused on another authentication attempt.

I don't agree on passkeys complicating things either. For me the authentication-flow is not more complicated then KeePasses autofill.

Assuming one can be 'tech savy' enough to not fall for fishing is bad. There are quite advanced attacks or you might even just be tired one day and do something stupid by accident.

What's that now? The weak point is the user's ability to implement MFA and biometrics? The same users who couldn't be bothered to create different passwords for different sites?

You don't expext the user to 'implement' mfa or biometrics. You expect them to use it. And most places where a novice would store passkeys don't just expect but enforce it. It is also way simpler to set up biometrics on one device compared to keeping with a good password strategy.

load more comments (3 replies)
[–] SaraTonin@lemmy.world 26 points 5 days ago (2 children)

The promise of passkeys when i first grad about them was that it would be quick and easy - that you wouldn’t need to enter a username or use 2fa. The reality appears to be that this is that it’s used ** as** 2fa

load more comments (2 replies)
[–] jobbies@lemmy.zip 25 points 5 days ago (1 children)
load more comments (1 replies)
[–] rekabis@lemmy.ca 25 points 5 days ago (1 children)

Just don’t take away passwords + TOTP 2FA for those of us who are actually using it correctly.

load more comments (1 replies)
[–] artyom@piefed.social 23 points 5 days ago* (last edited 5 days ago) (14 children)

Somehow PieFed is able to make them work but simultaneously many large companies are shifting to "magic links" sent to your email. 😡

load more comments (14 replies)
[–] hummingbird@lemmy.world 22 points 5 days ago (3 children)

You missed some disadvantages. For example the UX and complexity are terrible.

load more comments (3 replies)
[–] nuko147@lemmy.world 21 points 5 days ago (2 children)

Tried Passkey in the past. I had many problems, especially could not understand why they must use my google account. Now my google account is gone, don't gonna go that rabbit hole again, i am happy with my Bitwarden and Aegis.

load more comments (2 replies)
[–] Zak@piefed.world 19 points 5 days ago (1 children)

I've been resisting using them and decided to set one on my rarely-used and unimportant Piefed account to try it out.

Saved to Bitwarden fine on my desktop browser. When I try to log in with a browser on my phone, it asks for my username and does nothing more after that dialog closes. While I'm not sure if this is a problem with Piefed, Bitwarden, or Firefox, I'm now disinclined to try it with anything important, especially if that thing might then discourage me from logging in with a password.

I recognize the theoretical advantages, but passkeys don't do much to solve problems I actually have. All my passwords look like @A#vVukh9c$3Kw4Cs8NP9xgazEuJ3JWE and are unique. Bitwarden won't autofill the wrong domain. I don't enter credentials in links from emails I didn't trigger myself immediately before. I haven't checked whether I can reliably backup and restore them in my Bitwarden vault.

load more comments (1 replies)
[–] CompactFlax@discuss.tchncs.de 17 points 5 days ago (4 children)

They’re device-bound certificate based authentication with some shiny bits.

Or they’re portable-via-certain-services certificate based authentication with some shiny bits.

Either way they’re new and try explaining that the user needs a new one for every device (or needs a new app to carry them around in) and that if the device dies, or the app dies, they lose it all. I have quite a few people in my life who can’t wrap their heads around using a password manager.

Personally, I find them irritating. My chosen password manager on iPhone doesn’t support them, so I need to have the iOS password vault turned on (yes, this is a dark pattern Apple has created to try to increase adoption of their password vault) to use them. Adoption needs to be much higher, interoperability needs to be better, and they need to put back the hint for which vault to use (which was removed early on to keep Microsoft and google from forcing chrome/edge vaults, but has the actual effect that chrome/edge tend to win the race over other options and means that the passkey prompt might be for a different app than the one that you prefer, leading to further user confusion)

[–] Triumph@fedia.io 20 points 5 days ago (1 children)

I really don’t want to turn my devices into hardware keys. I can’t imagine how difficult it would be to recover if, say, there was a fire or flood. Hardware breaks, gets lost, stolen. How about people who can’t afford multiple devices? What about the unhoused? How about if you get arrested and your one device gets confiscated- you can’t even give anyone else access to your data. What if you’re a good witness recording something and the police decide to make your device into evidence (or destroy it).

MFA? Absofuckinglutely. I’ll pass on passkeys, sorry.

[–] CompactFlax@discuss.tchncs.de 9 points 5 days ago (3 children)

Yeah this is my situation. My personal computer is really infrequently used and as such I’m already in a dangerous situation when it comes to sign-in risk detection kicking off and asking for further authn proofs. I’ve had my phone die (and come to life when its replacement arrived) and that was a harrowing situation because all the MFA is stored there. Passkeys seem to make it worse, unless I subscribe to a sync service, which I need to infallibly trust (and I’m iffy on that; 1Password has a good security model and all that but passkeys are a different level of trust).

load more comments (3 replies)
load more comments (3 replies)
[–] Korhaka@sopuli.xyz 14 points 4 days ago (4 children)

I don't want to boot up a fucking android VM to run some login app every time I need to log into an unimportant account that realistically I would have used "el-passwordo" for the password if it let me.

load more comments (4 replies)
[–] lucille@piefed.blahaj.zone 14 points 5 days ago (1 children)

It seems like the idea behind having the passkeys synced through cloud platforms is to mitigate the device failure risk as much as possible, as any device logged into the cloud account could be used to access the passkey protected accounts. It seems a little short-sighted as it means that the passkeys are limited to AAL2 (as AAL3 requires it to be non-exportable), and depends on the security of the cloud account. The cloud account can't use anything as secure as a passkey, as it would reintroduce the device failure risk (meaning that your security has been downgraded from AAL3 to AAL2 for no reason).

It should also be noted that if the cloud account is not phishing-resistant (which it can't be for reasons stated above), then the accounts protected by passkeys aren't phishing resistant either, as the cloud account could be phished, which would lead to a compromise of the other accounts.

At AAL2 you could also just use a password and OTP, which doesn't have the vendor lock-in problems with cloud synced passkeys and has a wider adoption already.

In my opinion there is no need for cloud syncing, as device failure risk is negligible if you have a backup security key (as the failure rate of a single security key is already extremely low).

load more comments (1 replies)
[–] The_Decryptor@aussie.zone 12 points 5 days ago (2 children)

I'm still annoyed that "OPAQUE" never seemed to catch on. Uses a username/password combo as normal, but never actually sends the password to the server, only a proof of knowledge. Even if the server is hacked and the DB leaked the attackers can't actually recover anything resembling a password from it, since the server simply never possesses it.

Passkeys are superior (No password at all), if only the UX around them was better.

load more comments (2 replies)
[–] Netrunner@programming.dev 10 points 5 days ago (17 children)

Passkeys are cool but you still need 2fa. Which may as well be a passkey itself.

One factor is not great even if it's a passkey.

[–] saltesc@lemmy.world 12 points 5 days ago (7 children)
  1. Built-In Two-Factor Security – Passkey logins use your private key stored on your device and your face or your fingerprint or your PIN. Unlike password, these cannot be easily replicated by a scammer.
load more comments (7 replies)
load more comments (16 replies)
[–] obinice@lemmy.world 9 points 5 days ago* (last edited 5 days ago) (4 children)

Okay, so long as a passkey is something I can memorise. Otherwise, it's significantly worse than a regular password (assuming you use good passwords and don't reuse passwords etc).

It seems like they want to tie it to a physical computer (like the one in your pocket), which sucks big time. What happens if I don't have access to that computer at all times, or it breaks, or is lost?

I'm planning on getting rid of my smartphone for something that just does calls and texts for example, because I'm sick of how unhealthily reliant I, and everyone, have become on this thing, and I want to be more connected to the real world. What then?

My brain is the best place to store passkeys, it can't be hacked, stolen, lost, etc, unlike every other option. It's easily capable of storing lots of randomised unique passwords for each service (surely I'm not the only one that can do this?). It's the clear winner.

load more comments (4 replies)
load more comments
view more: next ›