Passkeys: how do they work? No, like, seriously. It’s clear that the industry is increasingly betting on passkeys as a replacement for passwords, a way to use the internet that is both more secure and more user-friendly. But for all that upside, it’s not always clear how we, the normal human users, are supposed to use passkeys. You’re telling me it’s just a thing… that lives on my phone? What if I lose my phone? What if you steal my phone?

  • Spotlight7573@lemmy.world
    link
    fedilink
    English
    arrow-up
    22
    ·
    10 months ago

    It’s probably overkill for most people but I would love to have a system that lets me choose what combination of factors together work to login rather than just ‘password and something else’. Something like A,B,C are on the account and you can use A+B or B+C to login. It’d be great for those who don’t necessarily want to trust SMS-based one-time passwords (due to SIM swapping, theft, etc) if we could require something else along with it.

    That said, the way passkeys are typically used satisfy multiple factors at once:

    Password to unlock your password database that stores your passkey: something you know, the password + something you have, the database

    Biometric to unlock your phone that has your passkey: something you are, fingerprint or face + something you have, the phone

    • scorpionix@feddit.de
      link
      fedilink
      English
      arrow-up
      14
      ·
      10 months ago

      Forget about biometrics, they are way too insecure.

      Our cameras have reached a stage where we can replicate fingerprints from photos. ‘What you are’ is useless when we leave part of us everywhere. And furthermore, in parts of the world, authorities can force you to unlock your device with biometrics but not with passwords.

        • IphtashuFitz@lemmy.world
          link
          fedilink
          English
          arrow-up
          5
          ·
          10 months ago

          Exactly. See my reply in another thread where I describe a “person trap” that I used to go through to get into a secure facility. Its biometric check analyzed the geometry of your entire hand. It wasn’t just a fingerprint scanner.

        • scorpionix@feddit.de
          link
          fedilink
          English
          arrow-up
          2
          ·
          10 months ago

          I strongly disagree. That’s like using MD5 and saying ‘It’s OK, we use SHA256 down the line’. Information encrypted with it might as well be in plain text.

          • frezik@midwest.social
            link
            fedilink
            English
            arrow-up
            6
            ·
            10 months ago

            That’s not how that works. If you were using MD5 and then immediately SHA256 the output and not using it for anything else, that would be fine. You’re not accomplishing much in this specific case, but it’d be fine.

            When you layer security, the attacker has to pull back each layer. You don’t rely on any singular layer. If the attacker needs biometrics AND a code AND a physical key, that’s very good security.

      • Spotlight7573@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        10 months ago

        For many people it works well as a trade-off between security and convenience. It may not be for everyone though and that’s okay. Nothing stops you from using a password/passcode to secure your passkey instead.