by gautamsomani on 7/1/24, 6:27 AM with 37 comments
by hgyjnbdet on 7/1/24, 8:22 AM
I'll be using keepassxc and passwords until I'm forced to use passkeys and then I'll use passkeys in keepassxc. No way am I tying my accounts to one of more devices controlled by multinational advertising companies.
by kats on 7/6/24, 1:41 AM
Summary: It's a password manager on your phone. You sign into your password manager with something easy like biometrics or a PIN. Then all the 'real' passwords for sites are autogenerated and those are what's sent to sites when you log in.
by heavyset_go on 7/6/24, 2:19 AM
It's interesting seeing how they're being used for lock-in, though. As mentioned in this thread, attestation in the standard will be abused towards that end.
by AnonHP on 7/6/24, 5:53 AM
I’m not sure if the author really understands passkeys well, because this statement seems either illogical or false (depending on which platform, device and passkey app one is using).
by Yaina on 7/6/24, 1:39 AM
by unethical_ban on 7/6/24, 2:45 AM
Is this just public/private keys with apple managing the keys and the security of the keys via their auth stack?
by cyberax on 7/6/24, 3:07 AM
In other words, they'll use Passkeys as a way to deepen the vendor lock-in. It has already started. For example, try to log into your Apple ID account using Safari, and it works via passkeys. No password needed. That's because Apple created a Passkey for apple.com automatically behind your back.
Now try the same from Firefox with BitWarden, and it doesn't work. And of course, there is no way for you to set up the passkey manually.
There's also no API to export it. Wouldn't it be nice if you could install BitWarden desktop client, and then use it migrate your passkeys? Nope. Not an option. The entitlement to interact with the Keychain for passkeys is only given out to browser vendors.