- cross-posted to:
- cybersecurity@fedia.io
- news@lemmy.linuxuserspace.show
- bionicjoey ( @bionicjoey@lemmy.ca ) 48•1 year ago
Missed opportunity for “What the eff is a Passkey?”
- CaptObvious ( @CaptObvious@literature.cafe ) 34•1 year ago
You’re still entering the password or pin for your password manager. I genuinely do not see how this is better. It’s simply an alternative, not an improvement.
- 📛Maven ( @Maven@lemmy.sdf.org ) English41•1 year ago
-
Password managers are, generally speaking, far more security conscious than the average website. I’d rather send a password to my password manager a couple times a day than send passwords to every website I interact with.
-
One click to confirm vs. 2-3 to autofill. Tiny gains in speed 🤷♀️ If you make a password manager even slightly more convenient than just using
gregspassword123
for everything, you can onboard more normies.
- Lem453 ( @Lem453@lemmy.ca ) 15•1 year ago
Most people that have password managers are already using different passwords for each website. Usually randomly generated. What’s the difference between that and a passkey?
- 📛Maven ( @Maven@lemmy.sdf.org ) English8•1 year ago
Right. Most people that have password managers. Making a password manager easier and more convenient to use means some portion of people who aren’t using one may start.
- Amju Wolf ( @amju_wolf@pawb.social ) 3•1 year ago
Realistically this is the biggest overall advantage.
Sure, there are minor advantages to people already using password managers, but that’s such a tiny minority of people…
- AmberPrince ( @AmberPrince@kbin.social ) 8•1 year ago
A pass key is the private key in a private/public key pair. The private key is stored in the TPM on your device. The website contains the public key. When you use your “one password” you’re in effect giving your device permission to access the key storage in your TPM to fetch the private key to present it to the site.
What this means in practice is that if a website has a data breach they won’t have your hashed password, only your public key which… is public. It doesn’t and can’t do anything on its own. It needs the private key, which again only you have and the website doesn’t store, to do anything at all.
If you want to read more about it look into cryptographic key pairs. Pretty neat how they work.
- meteokr ( @meteokr@community.adiquaints.moe ) 3•1 year ago
When you use your “one password” you’re in effect giving your device permission to access the key storage in your TPM to fetch the private key to present it to the site.
Very small correction as I understand, but your private key is never presented. The web service should never interact with the private key directly. Your device is signing some bit of data, then the server uses your public key to verify that it was signed by your private key. Its a small distinction, but is one of the principal uses of asymmetric encryption is that the public key can truly be public knowledge and given to anyone, while the private key is 100% always only accessed by you the user.
- Natanael ( @Natanael@slrpnk.net ) 2•1 year ago
Yeah, the TPM should perform the signature inside of the security chip, the key is always off limits from everything else
- Natanael ( @Natanael@slrpnk.net ) 2•1 year ago
Passkeys use cryptographic keys held client side which are never transmitted, they user cryptographic challenge-response protocols and send a single use value back. You can’t intercept and reuse it unlike with passwords.
- locuester ( @locuester@lemmy.zip ) English5•1 year ago
But does their advantage in security overcome the fact that they’re a much larger target?
It’s similar to how money under a pillow could be safer than money in the bank; depending on who you are.
- 📛Maven ( @Maven@lemmy.sdf.org ) English5•1 year ago
In general, yes. Big sites get hacked all the time. Passwords from those sites get cracked all the time. Anyone who uses the same password on multiple sites is almost guaranteed to have that password stolen and associated with a username/email at some point, which goes on a list to try on banks, paypal, etc.
Conversely, to my knowledge, there has been one major security breach at a password manager, LastPass, and the thieves got more-or-less useless encrypted passwords. The only casualty, at least known so far, is people who used Lastpass to store crypto wallet seed phrases in plaintext, who signed up before 2018 when the more secure master password requirements were put in effect, chose an insecure master password, and never changed it once in the four years prior to the breach.
It’s not perfect, but the record is lightyears better.
Put it this way: Without a password manager, you’re gambling that zero sites, out of every single site you sign on to, ever gets hacked. From facebook, google, netflix, paypal, your bank, your lemmy or mastodon instances, all the way down to the funny little mom-n-pop hobby fansite you signed up for 20 years ago that hasn’t updated their password hashing functions since they opened it. With a password manager, you’re gambling that that one site doesn’t get hacked, a site whose sole job is not to get hacked and to stay on the forefront of security.
(Also, you don’t even have to use their central servers; services like BitWarden let you keep your password record locally if you prefer, so with a bit of setup, the gamble becomes zero sites)
- locuester ( @locuester@lemmy.zip ) English2•1 year ago
I use a different password for every site tho. Using same pw for every site, that’s another extreme entirely.
- 📛Maven ( @Maven@lemmy.sdf.org ) English4•1 year ago
Most people do not. The average user has one or two passwords, and maybe swaps out letters for numbers when the site forces them to. Because remembering dozens of passwords is hard. If you, personally, can remember dozens of secure passwords, you’re some kind of prodigy and the use-case for a password manager doesn’t apply to you, but it still applies to the majority.
- locuester ( @locuester@lemmy.zip ) English2•1 year ago
One doesn’t have to remember dozens. Just a basic algorithm for deriving it from the name of the site. Complex enough that it’s not obvious looking at a couple passwords but easy to remember.
This method works for me. I understand its dangers (can still correlate. Dozen passwords and figure out the algo). But it’s my current approach. I hate even discussing it since obscurity helps.
- Amju Wolf ( @amju_wolf@pawb.social ) 4•1 year ago
Your system is most likely way less secure than you think. I mean, possibly not since you’re here, but most schemes are trivial to solve even automatically.
…and that doesn’t really matter either, because so many people have such shitty passwords (and use the same ones everywhere) that noone really bothers checking for permutations when they have thousands of valid accounts.
But if truly enough people are convinced to be more secure your scheme may eventually become a target, too.
With passkeys (and password managers in general) the security gets so good that the vast majority of current attacks on passeord protection get obsolete.
- 📛Maven ( @Maven@lemmy.sdf.org ) English4•1 year ago
Okay, I’m glad you have a system, but it’s not really relevant? I didn’t say you should use a password manager. I said it’s good for the majority of people who can only remember one or two passwords.
-
- ellotheth ( @ellotheth@artemis.camp ) 23•1 year ago
You’re entering your password into your password manager, which is stored by a company or entity whose entire job is to keep it secure. You’re not giving your password, in any form, to the website or service you’re accessing. When the website gets compromised, your hashed password is not in a database waiting to be cracked. All the attacker gets is a public key they can’t use for anything.
- skillful_garbage ( @skillful_garbage@beehaw.org ) 15•1 year ago
Passkeys are asymmetric, meaning that the server only ever sees your public key. If the server gets breached, then only your public key is leaked, which isn’t a big deal. Functionally, it’s almost identical to SSH keys.
- lud ( @lud@lemm.ee ) 3•1 year ago
Since you should use a password manager anyways, it wouldn’t make a difference if they get a randomised password or public key.
- lemmyvore ( @lemmyvore@feddit.nl ) English9•1 year ago
If they get your password they can impersonate you to the server. They can’t do that with just the public key part of your passkey.
- lud ( @lud@lemm.ee ) 2•1 year ago
That’s true.
Ideally my password should be hashed and salted anyways, so that shouldn’t make a huge difference.
- m-p{3} ( @mp3@lemmy.ca ) 12•1 year ago
If you’re using a hardware token like a YubiKey then you do need to enter your PIN before being able to use it.
The main benefit is that you cannot extract the Passkey from the secure element (the token cannot be transformed from what you have to what you know) and it cannot be phished through a fake domain as the challenge-response will not match.
- 👁️👄👁️ ( @mojo@lemm.ee ) English4•1 year ago
Because it’s for your website logins. It just stores the key and auto logins.
- Natanael ( @Natanael@slrpnk.net ) 2•1 year ago
Because you don’t send a secret value, you only send a cryptographic asymmetric single use value which is safe to disclose
- dan1101 ( @dan1101@lemm.ee ) 14•1 year ago
I can see the “phone falls into the toilet” as a big problem that people will have.
- lemmyvore ( @lemmyvore@feddit.nl ) English8•1 year ago
It’s already a huge problem now. Lots of people only have one auth device they depend on for everything. At least passkeys come with standards which should help spread the use of vault sync and backups and hopefully those practices become the norm.
- jared ( @jared@kbin.social ) 4•1 year ago
RIP local sexpot.
- umbrella ( @umbrella@lemmy.ml ) 5•1 year ago
something from a corporation that cannot be trusted?
- Snot Flickerman ( @SnotFlickerman@lemmy.blahaj.zone ) English32•1 year ago
Except passkeys are an Open Authentication standard from the FIDO alliance. Soooooo, not from a corporation.
https://fidoalliance.org/passkeys/
You can use passkeys in KeePassXC, if I understand correctly.
They are the equivalent of using a hardware key like YubiKey or SoloKey, except the passkey is stored on your phone/PC instead of a USB thumbstick.
- umbrella ( @umbrella@lemmy.ml ) 5•1 year ago
still no reason to trust google with this.
they have hijacked and dominated open source software quite a bit in the past.
- Snot Flickerman ( @SnotFlickerman@lemmy.blahaj.zone ) English47•1 year ago
Except Google was only mentioned in terms of whether or not they support it.
You’re commenting on an article from the Electronic Frontier Foundation, an organization dedicated to fighting for internet and digital freedoms, about an open standard that has only just begun being implemented widely.
Look, I hate corpos as much as anyone, but please let’s please tone down the alarmism.
- catboss ( @catboss@feddit.de ) 10•1 year ago
I’d like to thank you for providing context to reactivism based solely on an emotional reaction without doing any research first.
I am guilty of that as well, but you put effort in, explained things and that takes time. Thanks.
[This comment has been deleted by an automated system]
- somenonewho ( @somenonewho@feddit.de ) 4•1 year ago
Damn I was wondering exactly that a few days ago. Once again lovely job from eff to clarify here.