478

Looks like a huge amount of security vendors are working to have a secure and open standard for passkey portability between platforms.

It is always good to see major collaboration in the security space like this considering the harsh opinions that users of some of these vendors have toward many of the others. I just wish apps and sites would stop making me login with username and password if passkeys are meant to replace that lol.

you are viewing a single comment's thread
view the rest of the comments
[-] Petter1@lemm.ee 1 points 23 hours ago

The thing is, that you only have to share public keys and never private ones. So you can only phish public keys…

[-] Ferk@lemmy.ml 2 points 13 hours ago* (last edited 13 hours ago)

You share public keys when registering the passkey on a third party service, but for the portability of the keys to other password managers (what the article is about) the private ones do need to be transferred (that's the whole point of making them portable).

I think the phishing concerns are about attackers using this new portability feature to get a user (via phishing / social engineering) to export/move their passkeys to the attacker's store. The point is that portability shouldn't be so user-friendly / transparent that it becomes exploitable.

That said, I don't know if this new protocol makes things THAT easy to port (probably not?).

[-] Petter1@lemm.ee 1 points 12 hours ago* (last edited 12 hours ago)

Well, they made it very secure with the transfer of passwords /s

It felt so strange having a CSV file with all my passwords and 2FA secrets in plain text in my downloads folder..

Imagine if would not have used a encrypted partition, my passwords may still be on that disk…

[-] ShortN0te@lemmy.ml 2 points 22 hours ago

The thing is, that you only have to share public keys and never private ones. So you can only phish public keys…

How would you sync or transfer a passkey across devices without transferring the private key?

[-] AA5B@lemmy.world 3 points 21 hours ago

That’s July question: the article even points that out. If previously the private key was in hardware, never exposed, but now it has to be available to software. Does it open any potential attacks?

Even if it is less secure, this is probably a good thing to prevent vendor lock-in. I know that’s one reason I rarely use passkeys

[-] Petter1@lemm.ee 2 points 20 hours ago

Yea, I strictly did not set up any passkeys until I got strongbox pro, to store it outside of apple walled garden. To get 2FA secrets was hard enough (had long time no macOS device, only iOS)

[-] ShortN0te@lemmy.ml 1 points 20 hours ago

That was a rhetorical question towards the commenter since the discussion point was not understood.

[-] Petter1@lemm.ee 2 points 20 hours ago

I read it again and agree 😂

this post was submitted on 14 Oct 2024
478 points (99.8% liked)

Privacy

31609 readers
483 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 4 years ago
MODERATORS