this post was submitted on 04 May 2024
58 points (96.8% liked)

No Stupid Questions

35703 readers
3746 users here now

No such thing. Ask away!

!nostupidquestions is a community dedicated to being helpful and answering each others' questions on various topics.

The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:

Rules (interactive)


Rule 1- All posts must be legitimate questions. All post titles must include a question.

All posts must be legitimate questions, and all post titles must include a question. Questions that are joke or trolling questions, memes, song lyrics as title, etc. are not allowed here. See Rule 6 for all exceptions.



Rule 2- Your question subject cannot be illegal or NSFW material.

Your question subject cannot be illegal or NSFW material. You will be warned first, banned second.



Rule 3- Do not seek mental, medical and professional help here.

Do not seek mental, medical and professional help here. Breaking this rule will not get you or your post removed, but it will put you at risk, and possibly in danger.



Rule 4- No self promotion or upvote-farming of any kind.

That's it.



Rule 5- No baiting or sealioning or promoting an agenda.

Questions which, instead of being of an innocuous nature, are specifically intended (based on reports and in the opinion of our crack moderation team) to bait users into ideological wars on charged political topics will be removed and the authors warned - or banned - depending on severity.



Rule 6- Regarding META posts and joke questions.

Provided it is about the community itself, you may post non-question posts using the [META] tag on your post title.

On fridays, you are allowed to post meme and troll questions, on the condition that it's in text format only, and conforms with our other rules. These posts MUST include the [NSQ Friday] tag in their title.

If you post a serious question on friday and are looking only for legitimate answers, then please include the [Serious] tag on your post. Irrelevant replies will then be removed by moderators.



Rule 7- You can't intentionally annoy, mock, or harass other members.

If you intentionally annoy, mock, harass, or discriminate against any individual member, you will be removed.

Likewise, if you are a member, sympathiser or a resemblant of a movement that is known to largely hate, mock, discriminate against, and/or want to take lives of a group of people, and you were provably vocal about your hate, then you will be banned on sight.



Rule 8- All comments should try to stay relevant to their parent content.



Rule 9- Reposts from other platforms are not allowed.

Let everyone have their own content.



Rule 10- Majority of bots aren't allowed to participate here.



Credits

Our breathtaking icon was bestowed upon us by @Cevilia!

The greatest banner of all time: by @TheOneWithTheHair!

founded 1 year ago
MODERATORS
 

Let's start with a smartphone. A user creates an account with a passkey for a service, that passkey gets stored on their smartphone, and they can use biometrics to sign in from then on. The private key is stored on the smartphone. Great.

But then how do you sign into that same service from a different device?

If it's by using a password manager, some third party piece of software, How do you sign in on a device where you're not allowed to install third party software?

all 30 comments
sorted by: hot top controversial new old
[–] credo@lemmy.world 29 points 6 months ago* (last edited 6 months ago) (4 children)

How do you sign in on a device where you’re not allowed to install third party software?

You don’t. Passkeys are very ecosystem-centric right now. If you are in apple, google, or Microsoft entirely, they will all allow you to move your passkeys around to different systems using the same basic mechanism they used for password keeping. Moving across ecosystems is absolutely broken - or rather - has never worked.

I think there are mechanisms to allow passkeys to work via Bluetooth or even via camera, as an external authenticator essentially, but I’ve never personally tried them.

[–] shortwavesurfer@monero.town 7 points 6 months ago (1 children)

Some password managers support passkeys, such as one password and proton pass, which will allow you to use multiple different devices. Personally, I am waiting for key pass to have proper support before starting to migrate to them.

[–] baatliwala@lemmy.world 1 points 5 months ago (1 children)

Is keepass actually going to have support for passphrases? The author works in archaic ways and I have a feeling he's never going to truly support it.

[–] shortwavesurfer@monero.town 1 points 5 months ago (1 children)

Keepass or keepassxc? Xc i think is a community fork.

[–] baatliwala@lemmy.world 1 points 5 months ago (1 children)

I mean regular keepass, I feel like XC is more likely to implement passkeys

[–] shortwavesurfer@monero.town 1 points 5 months ago

Okay, I see I have never used a regular one. I think I read to use XC by default. Somewhere. And so that's the one I've always used. I've never even downloaded the original one.

[–] iarigby@lemmy.world 1 points 6 months ago

I use camera one for github on a device outside my icloud, works great. A few websites also allowed me to add second passkeys (bitwarden in addition to icloud)

[–] rdyoung@lemmy.world -3 points 6 months ago* (last edited 6 months ago) (1 children)
[–] NosferatuZodd@lemmy.world 1 points 6 months ago (2 children)

FYI there's a bug currently that lets everyone see the comment even after they are deleted

I use sync on android but I believe it's a bug in the API so it should be everywhere

Just try to reply to the comment and you'll see it

[–] IHateReddit@lemmy.world 1 points 6 months ago

this has been a thing for a few months now

[–] rdyoung@lemmy.world 0 points 6 months ago

Good to know

[–] sznowicki@lemmy.world 7 points 6 months ago

Service shows you a code that you scan with your device. This code transfers some challenge and information where to send a response. Your device checks if you’re you and then sends a response telling the server you try to log in that hey this guys is indeed the guy, here’s the problem I solved using my private key (asynchronous encryption).

[–] Bishma@discuss.tchncs.de 5 points 6 months ago (3 children)

I use 1Password as my Passkey holder so it's device agnostic. But if 1Password ever pulls a LastPass, it won't seem like a clever solution anymore.

[–] Lichtblitz@discuss.tchncs.de 5 points 6 months ago

1Password can't fail that hard easily. They've done great write-ups to compare their architecture to that of LastPass. Long story short: it's the secret key that protects you: https://blog.1password.com/what-the-secret-key-does/

[–] jeena@jemmy.jeena.net 3 points 6 months ago (1 children)

I would suggest to move to KeepassXC, which already shown that even when KeepassX was too slow to implement features the community was healthy enough to fork it and make it the main fork.

[–] dinckelman@lemmy.world 2 points 6 months ago (1 children)

The wallet itself is nice, but managing the database transfers between devices isn't really something I want to do manually, especially given that devices like Apple's iPhones don't support background syncing, crippling Syncthing clients, or alternatives

[–] jeena@jemmy.jeena.net 1 points 6 months ago

I've used it on a iPhome once with a Syncthing alternative client and some alternative Keepass app. It worked very well but it was only for a month or two and I don't change passwords often so I might not realized that syncing doesn't work well.

[–] panicnow@lemmy.world 4 points 6 months ago

Depending on the site, you can use one device to login to another without installing additional software. For instance, if you have an iPhone with a passkey for microsoft.com stored on it, you can login to Microsoft.com using the iPhone.

Here is a webpage that has some screenshots to show you what I mean. You can probably google some other examples.

https://appleinsider.com/articles/24/05/02/microsoft-finally-lets-users-sign-into-accounts-with-passkeys

It is possible to sync passkeys across devices but at this point is mainly within a single ecosystem.

[–] SnotFlickerman@lemmy.blahaj.zone 3 points 6 months ago

Short answer: they don't very well yet.

[–] berkeleyblue@lemmy.world 3 points 6 months ago

Passkeys should display a QR Code for you to scan with a trusted device if you try to use them on a device that doesn’t have your passkey stored.

[–] Everythingispenguins@lemmy.world -5 points 6 months ago* (last edited 6 months ago) (2 children)

I would really recommend never using bio metrics on your phone regardless of the context. It is easier to fake that you would want it to be. Also you are legally allowed to not tell the law your password. But they can take your biometrics by force.

Edit people really love their biometrics lol

[–] adespoton@lemmy.ca 3 points 6 months ago* (last edited 6 months ago) (1 children)

I’ve got a pair of YubiKeys that I use to back my passkeys. Works great; I’ve got passkeys that work within the Apple, Microsoft and Google ecosystems and don’t have to worry about password prompts for the most part — but I DO need a YubiKey handy to validate that it’s actually me at the device.

My keys use both NFC and USB-C and work across all my passkeys supported devices when I add in a USB adapter.

One spends most of its time in a safe deposit box, and the other lives on my physical keychain.

To use it, the person would need to be logged in on a device I own (that’s password protected) AND have one of the keys (which also requires a PIN).

[–] Everythingispenguins@lemmy.world 2 points 6 months ago (1 children)

Sounds much safer than biometrics.

[–] adespoton@lemmy.ca 1 points 6 months ago

Definitely. Costs extra, has an extra step to set up, and has an extra step to use, but is so much more secure.

That said, biometrics are better than “1234”. I have no issues with people who have bad password hygiene moving to biometrics, which at least add an extra barrier for account compromise.

But for the rest of us, physical security tokens are definitely the way to go.

[–] hedgehog@ttrpg.network 1 points 6 months ago (1 children)

Unless you’re using a random 10+ alphanumeric passcode and are fine entering it every time you log into your phone, with a short auto-lock period, you’re much better off enabling biometrics (assuming it’s implemented competently) in combination with a longer passcode and understanding how to disable it when appropriate.

I recently replied with this comment to a Gizmodo article recommending the same thing you did for similar reasons, if you’d like to better understand my rationale: https://ttrpg.network/comment/6620188

[–] Everythingispenguins@lemmy.world 1 points 6 months ago (1 children)

Read your other comment and I don't disagree. There are two things that I feel could though have a hiccup. First there is a real possibility that you will not be able to lock your phones. I have never set up face ID on any android I have had, but I don't see any reference to an auto time out on Android on my phone or any of the setup walkthroughs online. Every manufacturer uses a slightly different build of android so it is hard to say that not Androids has it.

Second it you have a ten digit password as a backup but use face id often the you could forget it. Which would lead many people to use an easy to guess password. Defeating much of the security with a long password has.

[–] hedgehog@ttrpg.network 1 points 6 months ago

I can’t speak to Android as a whole, but here’s how often Samsung Face Unlock will require you to re-auth with your phone’s passcode:

  • after 4 hours of not using the phone
  • after restarting
  • at least once every 24 hours

iPhones do something similar, but it’s after 48 hours of non-use (instead of 4) and at least weekly instead of daily. Having to enter your password daily should help most people keep it memorized pretty well, but weekly - maybe not. So you definitely have a good point there.

One thing that can make it easier to remember - and just as secure - is to use a longer pass phrase instead of random characters.

If you using the diceware approach (“correct horse battery staple”), then 5 words has 32 times / 5 bits more entropy than a 10 character mixed-case alphanumeric password (64 vs 59 bits of entropy) (4 word passphrases aren’t random enough to be recommended - they have fewer bits of entropy (51) than even 9 character mixed-case alphanumeric passwords (53), though notably 10 same-case alphanumeric characters also have only 51 bits of entropy).

The EFF has a word list that’s been improved for usability. They also have a short list, comprised of words with at most 5 characters each, where you roll 4 dice instead of 5. With 6 words from that list you get 62 bits of entropy, which is good enough to be able to recommend.