TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Passkey is just a different password manager. Stop trying to kill the password

8 点作者 srevenant大约 2 年前
My assertion below. Prove me wrong :)<p>It&#x27;s clear that a lot of people don&#x27;t understand the basic tenets of strong authentication, which is best done with at least:<p>1. Something you know 2. Something you have<p>This is the heart of MFA. The problem with passwords is around point #1 — &quot;something you know&quot;. For so long this has been the ONLY thing to authenticate, and that&#x27;s a serious problem, because people don&#x27;t do the #1 very well.<p>So for years people tried to strengthen #1, which has been a fruitless battle. People continue to write down passwords, they continue to make them insecure, and not rotate them.<p>But that&#x27;s the whole point of MFA.<p>The crusade should be about getting to MFA, not abolishing #1.<p>The problem with Passkey, is it just swaps #1 with #2, and if anything, gives a very large false sense of security, because most people I know who do actually do MFA also do it on their phone, which is also the same device doing their passkey.<p>Infact some people think that Passkey is a replacement for having MFA!<p>But it really isn&#x27;t much different than just using a password manager.<p>Because most people use their phone for their MFA (right or wrong), now we are just at:<p>1. Something you have. 2. The same thing you have.<p>And folks, that&#x27;s no longer MFA!<p>I&#x27;m not saying Passkey is bad, I&#x27;m saying this crusade to kill the password is completely misaligned, it&#x27;s confusing people, and it&#x27;s really better to focus on explaining to people the point of MFA (the above two things).<p>Passkey is, at best, a QOL thing.<p>It&#x27;s BETTER than weak passwords that are never changed. It&#x27;s BETTER than even strong passwords that are never changed.<p>But it&#x27;s really not any different than strong passwords with rotation, and a password manager.

4 条评论

compressedgas大约 2 年前
But there is a fundamental difference. Password fishing is impossible with passkeys. You may authenticate to a site that you didn&#x27;t mean to with a key you meant to use elsewhere but this does not allow that site to impersonate you on that other site.
rektide大约 2 年前
I don&#x27;t think you grasp how many different options a site can make when asking for passkeys.<p>Passkeys definitely retain something you know &#x2F; something you have restrictions, if the site asks for it.
aborsy大约 2 年前
You didn’t get it. Passkeys are public key cryptography. It’s like SSH authentication with public keys versus password.
hayst4ck大约 2 年前
Instead of framing your opinion through a philosophical theoretical lens, instead frame it through a practical lens or an actual real life security threat assessment based lens. Think about things like phishing, password re-use, sucking data out of the system clipboard, or keylogging.<p>Passwords are symmetric in nature while keys are asymmetric. This property defeats a very large number of attacks without really increasing the attack surface.<p>The 2nd factor is not just something you have, but also something you have right now. Time is not an irrelevant factor. You are correct that it is bad for these to co-exist on the same device. Being on different devices boosts security considerably. Yubikeys and secure enclaves are both good things.<p>&gt; 1. Something you know 2. Something you have<p>I think you are stumbling over this statement. You are treating it as a-priori truth, when it is not derived from mathematic truth. &quot;Something you know and something you have&quot; is the result of a practical and economic processes of generating better systems of authentication.<p>&gt; which has been a fruitless battle<p>This is false, password managers and salted hashed passwords as well as more advanced hashing algorithms have boosted security significantly. Security teams at large companies have done significant work around forcing password changes against people suspected of being compromised. Password managers themselves have started to warn people about password re-use which is also very positive.<p>&gt; never changed.<p>Password rotation is not really considered a security practice of value at least among people I know. I think most people who work in security would consider it security theater. Password rotation is a band-aid for the problem of password re-use. Changing a password only matters <i>if</i> the password has already been compromised. So password rotation is a mitigation technique more than a security technique.<p>&gt; But it&#x27;s really not any different than strong passwords with rotation, and a password manager.<p>It&#x27;s also important to consider that passkeys are behind your phones password or your systems password. So there is still generally a password protecting these items, but the password is a local check rather than a check against a remote machine.<p>Summary of my response to you:<p><pre><code> The difference between symmetric and asymmetric encryption is real and of value. Passkeys still require &quot;something you know&quot; to get loaded into memory. You are right to not want multiple factors on the same device. Password rotation is a red herring. Think of things in terms of the attacker, not in terms of how things &quot;are supposed to be.&quot; </code></pre> Blind adherence to rules that you don&#x27;t understand how they are made is called cargo-culting and people in security <i>hate</i> cargo-culting. You made a post because you understand that there are things you don&#x27;t know you don&#x27;t know, and that is a good instinct. What you don&#x27;t know is the properties of asymmetric encryption and potentially standard techniques for compromising authentication.<p>You took the correct idea that multiple factors of authentication being on the same device is bad and turned that into the (IMHO) false idea that passwords have better security properties than passkeys.