Passkeys are generally available on GitHub
Submitted 1 year ago by starman@programming.dev to programming@programming.dev
https://github.blog/2023-09-21-passkeys-are-generally-available/
Submitted 1 year ago by starman@programming.dev to programming@programming.dev
https://github.blog/2023-09-21-passkeys-are-generally-available/
anti_antidote@lemmy.zip 1 year ago
Can someone tell me why I should care about this rather than just continuing to use my password and 2FA?
Greensauce@sh.itjust.works 1 year ago
I’m stealing this from another comment:
The main advantage comes with phishing resistance. Standard MFA (time based codes) is not phishing resistant. Users can be social engineered into giving up a password and MFA token. Other MFA types, such as pop up notifications, are susceptible to MFA fatigue. Similar to YubiKeys, Passkeys implement a phishing resistant MFA by storing an encryption key, along with requiring a biometric. The benefit here is that these are far easier for the average user, and the user does not need to carry a physical device. Sure, fingerprints could possibly be grabbed with physical presence, but there is far less risk that a users fingerprint is stolen, than a user being social engineered over the phone into giving creds. For most organizations and users, this is far more secure.
SorteKanin@feddit.dk 1 year ago
So basically this is just idiot-proofing the system. If you aren’t the type of person to give your password or MFA token to another person, then passkeys don’t really make better security.
atheken@programming.dev 1 year ago
And, they are actually more convenient because then entire login process is one step, rather than two.
takeda@lemmy.world 1 year ago
I kind of don’t like to store my fingerprints with Google. Even FBI collects them when you are indicted.
What about allowing us to log in to services via asymmetric keys?
Klajan@beehaw.org 1 year ago
From just now reading the Docs regarding passkeys.
The main draw seems to be that it is easy to sign in (just requiring biometrics for example) and mainly a lot more resistant to phishing.
Dark_Arc@social.packetloss.gg 1 year ago
At this point, you probably shouldn’t.
At some point, passkeys will be ubiquitous enough they’ll be like low friction SSH keys for web authentication (i.e. there will be no shared secrets in the login process).
Asudox@lemmy.world 1 year ago
It has its own pros. The biggest one is that it uses asymmetric cryptography. This means that the only one that can sign a challenge given by the server is the one that has the private key equivalent of the public key the challenge was used to be encrypted with. The challenge is sent to the client, in which the client signs the challenge the server sent with their private key and then sent back to the server. Since the server has the public key, the server can verify whether the signature is indeed from the private key owner. This is the reason why it is phish proof. Though I am not sure whether a phisher can just take the challenge, let the victim sign it and then give back the challenge to login. Can anyone confirm that?
ck_@discuss.tchncs.de 1 year ago
That is not technically correct. Passkey is a protocol first and foremost, and the way it is implemented is up to the vendor. Can be software, eg. Apple, Google, Bitwarden, etc, but you can as well use a hardware key, eg. Yubikey has Passkey support for quite a while now.