TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The cryptography behind passkeys

272 pointsby tatersolid3 days ago

11 comments

labadal3 days ago
I love passkeys. I love them being on my phone, requiring biometric authentication before unlocking. I just hate the vendor lock in that comes with it.<p>Does anyone know the state of the standard wrt this? I know that they planned on doing something about it, just haven&#x27;t kept up.
评论 #43989772 未加载
评论 #43986591 未加载
评论 #43988343 未加载
评论 #43986336 未加载
评论 #43986797 未加载
评论 #43986146 未加载
评论 #43988450 未加载
评论 #43986043 未加载
评论 #43996382 未加载
评论 #43988462 未加载
评论 #43986375 未加载
评论 #43986113 未加载
评论 #43987669 未加载
lxgr2 days ago
&gt; Generally, authenticators are “something you have.”<p>Shameless plug: Here&#x27;s one that is &quot;something you know&quot; :) <a href="https:&#x2F;&#x2F;github.com&#x2F;lxgr&#x2F;brainchain">https:&#x2F;&#x2F;github.com&#x2F;lxgr&#x2F;brainchain</a><p>It derives all keypairs from a passphrase, and rederives the private key from the key handle, similar to &quot;stateless&quot; hardware authenticators.<p>Please don&#x27;t use it for anything important – it&#x27;s a fundamentally bad idea, similar to &quot;brain wallets&quot;; I only implemented it to figure out whether it was possible, and to improve my own understanding of the WebAuthN and FIDO specifications.
评论 #43990804 未加载
评论 #43992856 未加载
whartung3 days ago
So how well do passkeys work when you don&#x27;t sync passwords. When you bounce from machine to machine. From OS to OS.<p>How well does password recovery work in those scenarios?
评论 #43987552 未加载
评论 #43993925 未加载
评论 #43987873 未加载
评论 #43987507 未加载
sschueller2 days ago
I see everyone putting their TOTP and second factor in the same vault as their username&#x2F;password. Doesn&#x27;t this defeat the purpose of the second factor to some degree?
评论 #43994124 未加载
评论 #43993036 未加载
评论 #43993853 未加载
评论 #43994343 未加载
评论 #43993714 未加载
评论 #43993414 未加载
评论 #43993389 未加载
petedoyle3 days ago
Somewhat off-topic: Does anyone know the underlying strength of the keys used as the &quot;root of trust&quot; behind passkey synchronization on Android&#x2F;iOS? I can&#x27;t find a lot of documentation on this.<p>It seems like they&#x27;re synced between devices using client-side encryption, with keys derived from your phone&#x27;s lock code (typically only 4-6 digits). Is it possible that the passkeys are fully random, but then encrypted with far less than 128&#x2F;256 bits of actual entropy while being synchronized between devices?<p>Could it be possible to brute force the keys server-side (IIUC, derived from 4-6 digit pins) with non-excessive amounts of compute? What am I missing?
评论 #43988516 未加载
评论 #43988077 未加载
评论 #43987995 未加载
joelthelion3 days ago
Are passkeys seeing any traction?
评论 #43994002 未加载
评论 #43990081 未加载
评论 #43987972 未加载
评论 #43993893 未加载
评论 #43992448 未加载
评论 #43994409 未加载
评论 #43991464 未加载
评论 #43988625 未加载
nemoniac3 days ago
Why does a browser have to be in the loop?
评论 #43988965 未加载
exabrial2 days ago
Have a question, is the TLSSessionState part of the signature nonce?<p>I remember this being an anti-MITM measure for u2f
评论 #43995621 未加载
andrewmcwatters3 days ago
Passwords and password managers seem good enough to me, and TOTP support is everywhere now.<p>Passkeys just feel like a standard written by large tech companies as a flywheel technology to keep me locked into whatever hardware and software ecosystem I&#x27;m already in since seemingly no one besides maybe Bitwarden supports exporting them. Which seems pointless, because I don&#x27;t know of any platform that supports importing them.<p>I am also getting tired of corporate white knight nerds defending trillion dollar companies telling me that portability isn&#x27;t a concern.
评论 #43987260 未加载
评论 #43987270 未加载
评论 #43987673 未加载
评论 #43992790 未加载
评论 #43988573 未加载
solarkraft3 days ago
Challenge-response with asymmetric encryption is pretty much perfect. I wish all auth worked like SSH.<p>Passkeys kind of take that concept, but make it suck. No backups. Terrible interoperability.<p>The other day I attempted to create one on my Mac with Firefox. The system passkey popup came up and made me scan a QR code with my iPhone that had to be connected to the internet. Bitwarden (my iOS passkey manager, that part works well) did open, but after selecting the profile to create the passkey in, it errored out. No passkey for me.
评论 #43987070 未加载
评论 #43987094 未加载
评论 #43989833 未加载
评论 #43991083 未加载
评论 #43994361 未加载
评论 #43987503 未加载
throw73 days ago
Is there a &quot;platform authenticator&quot; that allows import&#x2F;export of the actual origin site, keypair, and credential id in plaintext? The next would be a variety of platform authenticators able to import and use those?<p>I don&#x27;t want vendor lockin and I don&#x27;t want proprietary third party cloud based backup&#x2F;recovery.<p>Today with totp, I store the plaintext otpauth url and I can use oathtool to spit out codes when needed on my desktop. My phone has aegis, but I don&#x27;t use any cloud based backup&#x2F;recovery. I switched from Google Authenticator after they implemented their cloud based syncing to google.
评论 #43988787 未加载
评论 #43990091 未加载
评论 #43988570 未加载