TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Passkeys are primarily about vendor lock-in

20 点作者 srevenant5 个月前
Hear me out, THEN tell me how wrong I am :D<p>With Microsoft&#x27;s latest admission that they&#x27;re FORCING everybody to use passkeys, it really gives one a moment of pause to reflect.<p>In the mad rush to &quot;improve security&quot; many people seem to be missing the entire point in this debate.<p>Passwords are &quot;something you know&quot; Passkeys are &quot;something you have&quot;<p>These two things are individual factors, and are not exclusive. Infact, &quot;MFA&quot; is to use two factors, not just one; and that is where the security comes from.<p>Switching to Passkey is nominal, at best, without having a second factor to keep it MFA.<p>If you care about security, don&#x27;t delude yourself in thinking passkey alone is some sort of holy grail, it&#x27;s not.<p>However, the push to replace passwords with passkeys is a fundamental shift in security paramount to changing gravity. And I, at least, think it&#x27;s a serious mistake.<p>The reason is that passkeys require something you have. Either hardware or virtually with software, but if you, for some reason, don&#x27;t have that thing, then guess what? For most lay users, it&#x27;s a serious point of pain and friction. Those who care about security are willing to accept that, but EVERYBODY? Is it really necessary for every single person to stop using passwords? Seems like a myopic assertion that doesn&#x27;t consider the users themselves.<p>The real problem here is evidenced by WHO is pushing for this. It is the platform vendors. Microsoft. Apple.<p>And why is that?<p>If Microsoft actually cared about their user&#x27;s security, they&#x27;d have resolved many other problems before this.<p>Personally, I think is about one thing and one thing only: Control of the users, and vendor lock-in to their walled garden.

6 条评论

gnabgib5 个月前
This surely would have been better as a comment on a passkey story?<p>Re: MFA<p>Password risk: low quality, reuse, malware, leak, phishing, social eng<p>Password+MFA risk: malware, leak, phishing, time-limited social eng<p>Passkey risk: malware<p>The benefit of MFA with a shared secret (aka password) is to defend against a party that has learned or guessed the secret (low quality password, password reuse, user hack&#x2F;malware, system hack&#x2F;leak, phishing). By requiring something you have (access to email, SMS, an authenticator app), and can prove you have access to in a small window - you can significantly reduce the risk of a successful login from someone other than the user. Reduce - if it&#x27;s user hack&#x2F;malware, or social engineering the other factor may also be obtainable.<p>Passkeys use public key crypto, rather than shared secrets. Your password <i>never leaves your device(s)</i>, so system hack&#x2F;leak can only lead to a public key becoming.. public. Passkeys are also machine generated, which eliminates the low quality password and password reuse problems. The negotiation is automated, rather than requiring typing from the user - so the ability to socially engineer is greatly reduced. Finally because the negotiation includes a challenge&#x2F;response, you still make a time-limited proof you known (like MFA).
评论 #42466852 未加载
toomuchtodo5 个月前
If you lose your passkey, why can you not reset your account like you would if you lost your password? These conspiracy theories are wild. Passwords suck. People reuse them. They use simple passwords. They are highly vulnerable auth factors. Passkeys are certificate auth for normies.<p><a href="https:&#x2F;&#x2F;www.yubico.com&#x2F;resources&#x2F;glossary&#x2F;what-is-certificate-based-authentication&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.yubico.com&#x2F;resources&#x2F;glossary&#x2F;what-is-certificat...</a><p><a href="https:&#x2F;&#x2F;passage.1password.com&#x2F;post&#x2F;passkeys-compliance-standards" rel="nofollow">https:&#x2F;&#x2F;passage.1password.com&#x2F;post&#x2F;passkeys-compliance-stand...</a><p><a href="https:&#x2F;&#x2F;www.biometricupdate.com&#x2F;202408&#x2F;passkeys-highlighted-in-new-cisa-guidance-on-secure-by-design-software" rel="nofollow">https:&#x2F;&#x2F;www.biometricupdate.com&#x2F;202408&#x2F;passkeys-highlighted-...</a>
评论 #42465702 未加载
FlxMgdnz5 个月前
Just dropping this here: <a href="https:&#x2F;&#x2F;fidoalliance.org&#x2F;specifications-credential-exchange-specifications&#x2F;" rel="nofollow">https:&#x2F;&#x2F;fidoalliance.org&#x2F;specifications-credential-exchange-...</a>
magic_smoke_ee5 个月前
If you can&#x27;t export them to local storage or an HSM of your choosing, can&#x27;t inspect them, and can&#x27;t lend them to others, then they&#x27;re proprietary BS. The problem is the notion of a passkey provider with a &quot;trust us to keep your private key intact and confidential on our servers&quot; cloud-required mindset.
solardev5 个月前
What vendor lock in? I have passkeys set in 1password, Bitwarden, Chrome, macOS, and Android. It&#x27;s fantastic using them to login to various sites and never having to deal with passwords.<p>They&#x27;re not 2fa, they&#x27;re a replacement for manually entering passwords. Basically a more secure autofill. Way easier to use than trying to adhere to every site&#x27;s different pw requirements.
nunez5 个月前
Eh, I don&#x27;t know.<p>Many of the password storage services support passkeys (which are crossed platform). You can also use a Yubikey as a passkeys.<p>Regardless, most people will store their passkeys in their iCloud or Google accounts, and given that those certs live in secure enclaves, this is way more secure than writing passwords everywhere or using SMS for 2FA (especially given SIM cloning attacks and the whole Chinese hackers in our networks thing)