this post was submitted on 16 Oct 2024
174 points (87.2% liked)

Technology

58685 readers
4013 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] pyre@lemmy.world 7 points 2 hours ago (3 children)

I'm not gonna lie I still don't understand how passkeys work, or how they're different from 2fa. I'm just entering a PIN and it's ok somehow? I don't get it.

[–] cashew@lemmy.world 7 points 2 hours ago (1 children)

It uses asymmetric cryptography. You sign a login request with the locally stored private key and the service verifies the signature with their stored public key. The PIN on your device is used to unlock access to the private key to sign the login request.

[–] AWittyUsername@lemmy.world 2 points 41 minutes ago (1 children)

So isn't the pin now the weakest link and shorter than a password

[–] Spotlight7573@lemmy.world 2 points 37 minutes ago

Typically in most situations where a PIN is used on a modern device, it is not just the number you enter but some kind of hardware backing that is limited to the local device and also does things like rate limiting attempts.

[–] Spotlight7573@lemmy.world 4 points 1 hour ago

The passkey stored locally in some kind of hardware backed store on your device or in your password manager is the first factor: something you have.

The PIN/password or fingerprint/face to unlock the device and access the stored passkey is the second factor: something you know or something you are, respectively.

Two factors gets you to 2FA.

[–] johannesvanderwhales@lemmy.world 3 points 1 hour ago* (last edited 1 hour ago) (1 children)

If you've ever used ssh it's very similar to how ssh keys work. You create a cryptographic key for the site; this is the passkey itself. When you go to "log in" the client and server exchange cryptographic challenges, which also verifies the site's identity (so you can't be phished...another site can't pretend to be your bank, and there are no credentials to steal anyway). Keys are stored locally and are generally access restricted by various methods like PIN, passphrase, security key, OTP, etc. When you're entering your PIN it's how the OS has chosen to secure the key storage. But you've also already passed one of the security hurdles just by having access to that phone/computer. It is "something you have".

[–] Valmond@lemmy.world 2 points 51 minutes ago (3 children)

So one password to access them all basically?

That's quite a weakness.

[–] johannesvanderwhales@lemmy.world 2 points 38 minutes ago

It''s really up to the end device (and the user of said device) to decide how much security to put around the local keys. But importantly, it also requires access to the device the passkeys are stored on which is a second factor. And notably many of the implementations of it require biometrics to unlock.

The "one password" thing is also true of password managers, of course. One thing about having one master passphrase is that if you do not have to remember 50 of them, then you can make that passphrase better then you otherwise might, plus it should be unique, which prevents one of the most common attack vectors.

[–] Spotlight7573@lemmy.world 2 points 45 minutes ago (1 children)

So one password to access them all basically?

That's essentially how all password managers work currently though?

[–] Valmond@lemmy.world 1 points 39 minutes ago (1 children)

True, I hoped for something better :-/

[–] Spotlight7573@lemmy.world 1 points 35 minutes ago

If it makes you feel better, most PINs on modern devices are hardware backed in some way (TPM, secure enclave, etc) and do things like rate limiting. They'll lock out using a PIN if it's entered incorrectly too many times.

[–] beejjorgensen@lemmy.sdf.org 2 points 46 minutes ago (1 children)

If you get my master keepass password, you have all my passwords, too.

[–] Valmond@lemmy.world 2 points 39 minutes ago (1 children)

As I said to Spotlight7573 yes true, I just hoped for something better.

[–] johannesvanderwhales@lemmy.world 1 points 27 minutes ago

If you're paranoid about this, go buy a yubikey and use that to secure your device/access to your passkeys. Being able to secure your own data instead of relying on the admin who may or may not know what they're doing to secure the server is an advantage of passkeys.