this post was submitted on 11 Nov 2025
290 points (87.6% liked)

Technology

76799 readers
3656 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Passkeys are built on the FIDO2 standard (CTAP2 + WebAuthn standards). They remove the shared secret, stop phishing at the source, and make credential-stuffing useless.

But adoption is still low, and interoperability between Apple, Google, and Microsoft isn’t seamless.

I broke down how passkeys work, their strengths, and what’s still missing

you are viewing a single comment's thread
view the rest of the comments
[–] saltesc@lemmy.world 12 points 2 days ago (2 children)
  1. Built-In Two-Factor Security – Passkey logins use your private key stored on your device and your face or your fingerprint or your PIN. Unlike password, these cannot be easily replicated by a scammer.
[–] Pamasich@kbin.earth 3 points 2 days ago (1 children)

This only applies though if it's a per-device passkey that uses a private key stored securely that cannot be exported.

If the private key can be exported, it can be stolen and the factors becomes invalid.

But people also store their private key in cloud solutions (some here mentioned doing that) which just makes the factor invalid anyway, since then it's not device-bound anymore, and it's the device that verifies your identity with those methods.

Like, what if someone hacks the cloud service storing the passkeys and steals them? Not really any different from storing passwords in a cloud, and that one isn't called 2FA either.

[–] saltesc@lemmy.world 1 points 2 days ago

The article is only referring to per device keys and passkeys that lock them on that device. In other words, someone would need to be able to get your device's key, decrypt it or brute your passkey, spoof or steal your device somehow, and send the key under it's identity. I'm sorry, but I don't think the few people that could do that would be wasting their time to do it to little old you. For most people, their insignificance is the best security they have.

[–] filcuk@lemmy.zip 3 points 2 days ago (2 children)

Isn't this optional? I use passkeys and have yet to be asked for anything else in addition to it.

[–] hitmyspot@aussie.zone 4 points 2 days ago

The passkey is only passed on with an unlocked device. So, if someone stole your passkey device, they can’t copy it and use it without unlocking.

[–] artyom@piefed.social 1 points 2 days ago (1 children)

I've only ever seen passkeys used as 2FA, personally.

[–] filcuk@lemmy.zip 4 points 2 days ago (1 children)

Really? If I open github (for example) and select passkey login, I just need to press ok using Bitwarden.

[–] fascicle@leminal.space 1 points 2 days ago

Amazon always asked for 2fa and then the passkey pops up but doesn't actually do anything other then tell me I have it enabled