This only applies though if it's a per-device passkey that uses a private key stored securely that cannot be exported.
If the private key can be exported, it can be stolen and the factors becomes invalid.
But people also store their private key in cloud solutions (some here mentioned doing that) which just makes the factor invalid anyway, since then it's not device-bound anymore, and it's the device that verifies your identity with those methods.
Like, what if someone hacks the cloud service storing the passkeys and steals them? Not really any different from storing passwords in a cloud, and that one isn't called 2FA either.
filcuk@lemmy.zip 1 day ago
Isn’t this optional? I use passkeys and have yet to be asked for anything else in addition to it.
artyom@piefed.social 1 day ago
I’ve only ever seen passkeys used as 2FA, personally.
filcuk@lemmy.zip 1 day ago
Really? If I open github (for example) and select passkey login, I just need to press ok using Bitwarden.
fascicle@leminal.space 1 day ago
Amazon always asked for 2fa and then the passkey pops up but doesn’t actually do anything other then tell me I have it enabled