“Passkeys,” the secure authentication mechanism built to replace passwords, are getting more portable and easier for organizations to implement thanks to new initiatives the FIDO Alliance announced on Monday.

  • Gutless2615@ttrpg.network
    link
    fedilink
    English
    arrow-up
    72
    arrow-down
    15
    ·
    edit-2
    1 month ago

    Literally just use a password manager and 2/MFA. It’s not a problem. We have a solution.

    • shortwavesurfer@lemmy.zip
      link
      fedilink
      English
      arrow-up
      41
      arrow-down
      3
      ·
      1 month ago

      Actually, it is still a problem, because passwords are a shared secret between you and the server, which means the server has that secret in some sort of form. With passkeys, the server never has the secret.

      • Gutless2615@ttrpg.network
        link
        fedilink
        English
        arrow-up
        13
        arrow-down
        4
        ·
        1 month ago

        The shared secret with my Vaultwarden server? Add mfa and someone needs to explain to me how passkeys do anything more than saving one single solitary click.

        • 4am@lemm.ee
          link
          fedilink
          English
          arrow-up
          19
          ·
          1 month ago

          When a website gets hacked they only find public keys, which are useless without the private keys.

          Private keys stored on a password manager are still more secure, as those services are (hopefully!) designed with security in mind from the beginning.

          • weststadtgesicht@discuss.tchncs.de
            link
            fedilink
            English
            arrow-up
            3
            ·
            1 month ago

            If a website with old-school passwords gets hacked, the hacker only gets salted hashes of passwords - this does not seem to be much worse?

            (Websites that store plaintext passwords surely won’t implement passkeys either…)

        • shortwavesurfer@lemmy.zip
          link
          fedilink
          English
          arrow-up
          11
          arrow-down
          1
          ·
          1 month ago

          Pass keys are for websites such as Google, Facebook, TikTok, etc. And then they go into what is currently your password manager or if you don’t have one, it goes into your device. You still have to prove to that password manager that you are, who you say you are, either by a master password of some sort or biometrics.

      • huginn@feddit.it
        link
        fedilink
        English
        arrow-up
        6
        arrow-down
        2
        ·
        1 month ago

        You can share passwords without the server seeing them. Many managers don’t but there’s nothing infeasible there. You just have a password to unlock the manager. Done.

        • shortwavesurfer@lemmy.zip
          link
          fedilink
          English
          arrow-up
          8
          arrow-down
          4
          ·
          1 month ago

          What I’m getting at is that a web server has a password, in some form. And so if that site gets breached, your password itself may not get leaked, but the hash will. And if the hash is a common hash, then it can be easily cracked or guessed.

          • huginn@feddit.it
            link
            fedilink
            English
            arrow-up
            10
            arrow-down
            1
            ·
            1 month ago

            Ultimately I’m pro passkey but when it comes to password managers: if the hash of your vault is easy to crack you’ve fucked up big time. There shouldn’t be any way to crack that key with current tech before the sun explodes because you should be using a high entropy passphrase.

          • theherk@lemmy.world
            link
            fedilink
            English
            arrow-up
            4
            ·
            1 month ago

            Not anything sufficiently modern. Salted passwords should be exceedingly difficult to reverse.

    • huginn@feddit.it
      link
      fedilink
      English
      arrow-up
      24
      ·
      1 month ago

      Never forget that technologically speaking you’re nothing like the average user. Only 1 in 3 users use password managers. Most people just remember 1 password and use it everywhere (or some other similarly weak setup).

      Not remembering passwords is a huge boon for most users, and passkeys are a very simple and secure way of handling it.

      • funkless_eck@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        19
        ·
        1 month ago

        I work for multiple organizations. The majority of which have a Google sheet with their passwords in that are

              c0mpanyname2018! 
        

        Those that aren’t are

               pandasar3cute123? 
        
        • Echo Dot@feddit.uk
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          1 month ago

          At one point the organization I work for had a password that was literally Password-022!, guess what it was the following month?

        • Prison Mike@links.hackliberty.org
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 month ago

          I had to start hashing passwords and sending it to the haveibeenpwned API.

          I also fight with my users over data normalization because any time I add some rule (like don’t put “SO#” as part of the value of the “SO#” field), they’re too stupid to realize the point and find some other “hack” around it.