Passkeys are built on the FIDO2 standard (CTAP2 + WebAuthn standards). They remove the shared secret, stop phishing at the source, and make credential-stuffing useless.

But adoption is still low, and interoperability between Apple, Google, and Microsoft isn’t seamless.

I broke down how passkeys work, their strengths, and what’s still missing

  • Passerby6497@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    1 day ago

    If it’s more convenient to be insecure than secure, users will pick insecure every time. There’s a reason there are so many bad password in the top passwords in breach dumps.

    I have to tell myself every time I go through some of my login flows that inconvenience to me means more so to an attacker, but most people don’t have an adversarial mindset and just want it to work.

      • Passerby6497@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        7 hours ago

        No, but the two tend to be correlated.

        Example, MFA authentication is a security feature, but inconvenient as shit with low or no lifetime. Same complaints about short lived sessions on app sites. Especially when every login requires MFA…

        • artyom@piefed.social
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 day ago

          MFA can be a variety of different things. In the case of passkeys, a prompt comes up on the screen, you click it, and that’s it. It’s both secure and convenient. That’s why it’s great.