Need is a strong word.
2FA is a pretty good idea for some applications and needless hassle for others. I don't need most of my accounts to have 2FA; I use a password manager with strong unique passwords, and for many accounts, having to make a new one would be an inconvenience rather than a tragedy.
Service providers might be motivated to force it on me if stolen accounts could cost them money, but most of them don't need to; it's just the most expedient move for them.
saltesc@lemmy.world 1 day ago
filcuk@lemmy.zip 1 day ago
Isn’t this optional? I use passkeys and have yet to be asked for anything else in addition to it.
artyom@piefed.social 1 day ago
I’ve only ever seen passkeys used as 2FA, personally.
filcuk@lemmy.zip 22 hours ago
Really? If I open github (for example) and select passkey login, I just need to press ok using Bitwarden.
Pamasich@kbin.earth 22 hours ago
This only applies though if it's a per-device passkey that uses a private key stored securely that cannot be exported.
If the private key can be exported, it can be stolen and the factors becomes invalid.
But people also store their private key in cloud solutions (some here mentioned doing that) which just makes the factor invalid anyway, since then it's not device-bound anymore, and it's the device that verifies your identity with those methods.
Like, what if someone hacks the cloud service storing the passkeys and steals them? Not really any different from storing passwords in a cloud, and that one isn't called 2FA either.
saltesc@lemmy.world 14 hours ago
The article is only referring to per device keys and passkeys that lock them on that device. In other words, someone would need to be able to get your device’s key, decrypt it or brute your passkey, spoof or steal your device somehow, and send the key under it’s identity. I’m sorry, but I don’t think the few people that could do that would be wasting their time to do it to little old you. For most people, their insignificance is the best security they have.