this post was submitted on 11 Nov 2025
292 points (87.6% liked)

Technology

76857 readers
1693 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Passkeys are built on the FIDO2 standard (CTAP2 + WebAuthn standards). They remove the shared secret, stop phishing at the source, and make credential-stuffing useless.

But adoption is still low, and interoperability between Apple, Google, and Microsoft isn’t seamless.

I broke down how passkeys work, their strengths, and what’s still missing

you are viewing a single comment's thread
view the rest of the comments
[–] sentientRant@lemmy.world -4 points 5 days ago (2 children)

Even if you are really careful, your details can always be leaked from a company server during a breach. If the companies adopt passkeys, that issue isn't there. Because there isn't a password anyone can randomly use. That's why I feel big tech companies are moving towards it.

[–] xthexder@l.sw0.com 4 points 5 days ago

Companies should already be storing password hashes, so the risk of leaking a hash vs a public key is roughly the same. It's just that private keys are generally longer than passwords and therefore harder to bruitforce.

Any company storing passwords in a recoverable format deserves to be hacked.

[–] Brokkr@lemmy.world 1 points 4 days ago

Yes, you have to trust the company storing the passwords.

A good company can store passwords in ways that are secure to most hacking attempts. It isn't impossible to break the encryption typically used, but it is difficult enough that most thieves will not have the resources or time to make use of the data. They want the low effort password databases, not the difficult and expensive ones.