this post was submitted on 11 Nov 2025
281 points (87.9% liked)

Technology

77164 readers
2550 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Passkeys are built on the FIDO2 standard (CTAP2 + WebAuthn standards). They remove the shared secret, stop phishing at the source, and make credential-stuffing useless.

But adoption is still low, and interoperability between Apple, Google, and Microsoft isn’t seamless.

I broke down how passkeys work, their strengths, and what’s still missing

you are viewing a single comment's thread
view the rest of the comments
[–] jj4211@lemmy.world 5 points 2 weeks ago (7 children)

Passkeys are a technology that were surpassed 10 years before their introduction

Question is by what? I could see an argument that it is an overcomplication of some ill-defined application of x509 certificates or ssh user keys, but roughly they all are comparable fundamental technologies.

The biggest gripe to me is that they are too fussy about when they are allowed and how they are stored rather than leaving it up to the user. You want to use a passkey to a site that you manually trusted? Tough, not allowed. You want to use against an IP address, even if that IP address has a valid certificate? Tough, not allowed.

[–] Brokkr@lemmy.world 13 points 2 weeks ago (6 children)

They were surpassed by password managers and 2fa.

[–] jj4211@lemmy.world 2 points 2 weeks ago (4 children)

Password managers are a workaround, and broadly speaking the general system is still weak because password managers have relatively low adoption and plenty of people are walking around with poorly managed credentials. Also doesn't do anything to mitigate a phishing attack, should the user get fooled they will leak a password they care about.

2FA is broad, but I'm wagering you specifically mean TOTP, numbers that change based on a shared secret. Problems there are: -Transcribing the code is a pain -Password managers mitigate that, but the most commonly 'default' password managers (e.g. built into the browser) do nothing for them -Still susceptible to phishing, albeit on a shorter time scale

Pub/priv key based tech is the right approach, but passkey does wrap it up with some obnoxious stuff.

[–] Rooster326@programming.dev 1 points 2 weeks ago (1 children)

password managers have relatively low adoption and plenty of people are walking around with poorly managed credentials

All of the modern browsers have built in password managers so I doubt that very much.

Are they as secure as your self-hosted bit warden that is not accessible via the Internet? No.

But it does still keep track of your usernames and even alerts you if you have a breach.

[–] jj4211@lemmy.world 1 points 2 weeks ago

Ok, I'll concede that Chrome makes Google a relatively more popular password manager than I considered, and it tries to steer users toward generated passwords that are credible. Further by being browser integrated, it mitigates some phishing by declining to autofill with the DNS or TLS situation is inconsistent. However I definitely see people discard the suggestions and choose a word and think 'leet-speak' makes it hard ("I could never remember that, I need to pick something I remember"). Using it for passwords still means the weak point is human behavior (in selecting the password, in opting not to reuse the password, and in terms of divulging it to phishing attempt).

If you ascribe to Google password manager being a good solution, it also handles passkeys. That removes the 'human can divulge the fundamental secret that can be reused' while taking full advantage of the password manager convenience.

load more comments (2 replies)
load more comments (3 replies)
load more comments (3 replies)