Passkeys: how do they work? No, like, seriously. It’s clear that the industry is increasingly betting on passkeys as a replacement for passwords, a way to use the internet that is both more secure and more user-friendly. But for all that upside, it’s not always clear how we, the normal human users, are supposed to use passkeys. You’re telling me it’s just a thing… that lives on my phone? What if I lose my phone? What if you steal my phone?

158 points

Until someone can explain to me how I can transfer, manage and control my passkeys without syncing them to some hostile corporation’s cloud infrastructure, passkeys will remain a super hard sell for me.

permalink
report
reply
37 points

You can use Bitwarden to store passkeys. Not sure if the self hosted solution has support for it yet though.

permalink
report
parent
reply
23 points

I must admit that, despite reading about passkeys a bit, I still don’t understand the actual practicalities. I seem to recall that Bitwarden can store keys, but can’t generate them. If that’s true, who generates the passkey?

permalink
report
parent
reply
22 points

Bitwarden can both generate and store them in the browser extension. It can also use them through the browser extension but it can’t yet use them through the mobile apps (they’re working on it).

permalink
report
parent
reply
10 points

Vaultwarden does at least, I’ve been using it with passkeys for the last couple months and it’s been great.

permalink
report
parent
reply
2 points

VaultWarden user here - yes you can now use your own self-hosted server to store passkeys and that’s a gigantic game-changer. Just install the BitWarden add-on on a recent version of Firefox and voilà

permalink
report
parent
reply
2 points

2024.1.2 released with self-hosted server passkey support.

TBH though I would not trust myself to self host my keys to my digital life when the alternative is $40/year for the whole family. You may have a different perspective though.

permalink
report
parent
reply
2 points

You can just use something like YunoHost, and synchronize weekly encrypted backups via Nextcloud or Syncthing to all of your computers. That way, if your server ends up busted for whatever reason, you can just restore it elsewhere and go back to business

permalink
report
parent
reply
26 points

I currently use Syncthing to keep my Keepass database updated on my phone, laptop, and home server. Any change anywhere is instantly sent directly to the other 2 devices.

permalink
report
parent
reply
6 points

Yeah, I do the same but with nextcloud.

permalink
report
parent
reply
3 points

How’d you get nextcloud actually working? I’ve tried a few times and it was never stable.

permalink
report
parent
reply
6 points

this is the way

you can even tweak folders to either send or receive only on some devices

plus if you really want to be safe you can set file versioning and ignore deletes on a folder to make it strictly backup on more than one device

no internet connection required, you can set it all on lan

I think it is my favorite open-source project after Torvalds’ creations

permalink
report
parent
reply
3 points

Does KeePass support passkeys?

permalink
report
parent
reply
5 points

KeePassXC is working on it but I haven’t seen anything about the original KeePass.

permalink
report
parent
reply
1 point

Can you use SyncThing along with Nextcloud? I currently use Nextcloud to store my data, but the one part where it still lags a bit behind is on Android specifically (you need to manually sync certain changes).

permalink
report
parent
reply
1 point

I don’t know anything about Nextcloud. Syncthing is open source, and there are a couple of Android apps. I use Syncthing Fork and don’t have any problems.

permalink
report
parent
reply
7 points
*

Depends on where the line is as far as evil goes. Most of the popular password managers are now starting to support storing passkeys.

permalink
report
parent
reply
5 points

I draw the line at the password manager being fully local.

permalink
report
parent
reply
3 points
*

You can create passkeys on individual devices without cloud syncing them. This is a normal usage pattern. How exactly this will be handled depends on the implementation.

permalink
report
parent
reply
3 points

Browsers can save them and extensions like, KeepassXC, can behave like a passkey provider

permalink
report
parent
reply
0 points

That’s something, but isn’t half the benefit meant to be storing them in the TPM? Also, that won’t help if you’re logging into a game or app, surely? Would love to be wrong on that, of course.

permalink
report
parent
reply
5 points

Many apps now do the ‘app opens the browser for login’ process instead of having the login in their actual app. They don’t have to implement all the different ways to log in then, they can just use the same system that their normal account management stuff on their site uses.

You can get greater security with hardware-backed solutions like a TPM but the adoption rate was not great. I think the goal is to improve things over passwords, even if the credentials are then available on multiple devices via a sync or a password database file. Perfect being the enemy of good and all that. Hardware options still exist and you can still use them; they use the same WebAuthn standard that passkeys use.

permalink
report
parent
reply
2 points

Also, that won’t help if you’re logging into a game or app, surely?

MicroG has added support for passkeys already

permalink
report
parent
reply
2 points

Yeah, I personally will only use hardware solutions for passkeys – YubiKeys and TPM-backed WHFB creds.

But the other reply makes a very good point about adoption being more important than perfection since, even with software-backed passkeys, you still have the benefit of the secret never leaving the client.

permalink
report
parent
reply
2 points

Enpass stores the passkey in their db, can be used cross platform and has browser extensions and local (or WiFi) syncing.

permalink
report
parent
reply
2 points

KeePass

Self hosted password keeper

permalink
report
parent
reply
11 points

I already use KeePass, but as far as I know it doesn’t do passkeys, only passwords?

permalink
report
parent
reply
8 points

I haven’t seen anything about the original KeePass supporting them but KeePassXC is working on it:

https://github.com/keepassxreboot/keepassxc/issues/1870

permalink
report
parent
reply
6 points

Bitwarden does passkeys supposedly. Haven’t tried it myself yet because I don’t know what to make of passkeys.

permalink
report
parent
reply
66 points

I didn’t like that they interviewed a corporate PR person instead of a real security expert. Sorry but that lady is just deflecting and spinning and missing so many important details to promote 1password.

Generally like the verge but this one was a bit lazy ngl - was there really no neutral or open source expert available?

permalink
report
reply
40 points

corporate PR person instead of a real security expert

That’s called an advertisement.

permalink
report
parent
reply
63 points

If only companies wouldn’t be patronizing ass hats about it. A few sites deny storing passkeys in software wallets because of “security”. So what, keep using my password is safer now? Fucktards.

permalink
report
reply
29 points

Many websites only allow creating a passkey on mobile for example. I also created passkeys on quite a few sites that straight up removed the feature a few days after. I also never found a site that let you completely remove password authentication after adding a passkey.

permalink
report
parent
reply
19 points

Even on mobile they are asshats. I have my password manager registered as the passkey wallet in iOS, so creating a passkey in PayPal for example fails.

permalink
report
parent
reply
3 points

PayPal’s passkey implementation really is the worst of all worlds.

permalink
report
parent
reply
2 points

Didn’t allow me to create one because it doesn’t meet the Google’s security thing (unlocked bootloader).

Fun

permalink
report
parent
reply
54 points

Can somebody help me understand the advantages of passkeys over a password manager? Googling just brings up tons of advertising and obvious self promotion, or ELI5s that totally ignore best passwords practices using managers.

permalink
report
reply
43 points
*

Passkeys work like a public/private key pair you’d use to secure SSH access to a server. You give the website a public key that corresponds to a private key generated on your local device. Unlike a password it’s not feasible to brute force and there’s nothing you have to remember which makes it more convenient for you to use. If a site is hacked and they gain access to the public passkey you use to authenticate, it can’t be used to authenticate anywhere.

It’s not really an alternative to a password manager, because you can use a password manager to generate and sync a single passkey between all your devices. In fact 1Password is a big proponent of passkeys and even maintain a big directory of sites that use passkeys.

permalink
report
parent
reply
1 point

there’s nothing you have to remember which makes it more convenient for you to use

Unlike my devices, I always have my brain on me. Devices are much more easily lost or stolen than memories. I often might want to access sites using my account from third party devices which I don’t want to be able to use my accounts when I’m not using them.

I just can’t understand how using passkeys (or password managers, for that matter, massive single points of failure that they are) is supposed to be in any way shape or form more convenient than simply remembering a passphrase (which can easily be customisable for each site using some simple formula so that no two sites will share the same but it’ll still be trivial to remember).

Both password managers and passkeys seem like colossal inconveniences and security risks to me when compared to passphrases, frankly. And if you want extra security there’s always two factor authentication (with multiple alternatives in case you don’t have access to one of them, of course; otherwise you might as well delete your account).

permalink
report
parent
reply
4 points

Coming up with a simple formula is a big security risk. It makes your passwords easier to brute force, and with enough entropy, probably easy to guess as well.

And what happens if the password is breached? Do you change the formula? What happens if a site requires a password change? Even if the formula accounts for versioning/iterating, how do you remember which iteration you’re on?

Extra security with 2FA I agree with, but that’s not mutually exclusive to using a password manager.

And are password managers really single points of failure? These password managers can sync to multiple devices, so your data is generally safe. If someone gets your password manager password, that’s a problem, yes, but they’d need access to your device to view anything, as installing on another device requires a separate master key to set it all up (which should not be stored digitally anywhere).

permalink
report
parent
reply
4 points

Both password managers and passkeys seem like colossal inconveniences

Both my mom and my grandma who are extremely far from tech literate absolutely love that I forced them into using a password manager because it is so much more convenient.

My mom wouldn’t even do the special algorithm for each site, she just had like 2 or 3 passwords that she would use depending on site requirements, and even that simple setup was far less convenient for her than a password manager. She was the one who initially had the idea to make my grandma use one because she became evangelized about how much better a password manager is than having to remember passwords.

Your point about inconvenience is just straight up wrong.

I would also vehemently disagree with your claim that they are a security risk unless you just straight up use them wrong / use hunter2 as your master password. But this comment is already super long so I will just stop there.

permalink
report
parent
reply
2 points

The benefit of passkeys over passwords is that they’re phishing resistant and use strong encryption. They’re effectively an iteration on yubikeys meaning you can have as many (or as few) passkeys associated with a given login as you’d like. So, you can easily prevent there being a single point of failure in the system.

Passkeys are tied to accounts and devices and those devices are the only devices used for authentication. This means you can access your account form a public device without that device ever knowing your credentials provided you and your secure device are physically present so it avoids the whole keylogger issue.

permalink
report
parent
reply
18 points

Passwords are known (or accessible in a password manager) by the user and the user gives one to a site to prove they are who they say they are. The user can be tricked into giving that password to the wrong site (phishing).The site can also be hacked and have the passwords (or hashes of the passwords leaked), exposing that password to the world (a data breach).

With passkeys, the browser is the one checking that it’s talking to the right site before talking by making sure the domain name matches. Passkeys also don’t send a secret anywhere but instead use math to sign a message that proves they are the returning user. This security is possible because there is a public key and a private key. The user is the only one with a public key. The authenticity of the message is guaranteed by math by checking it with the public key that the user provided to the site when they registered their passkey. The site doesn’t need access to the private key that the user has to verify the message so there’s nothing sensitive for the site to leak.

In practical terms, instead of having to have your password manager autofill the username and password and then do some kind of second factor, it just signs a message saying “this is me” and the site logs you in.

permalink
report
parent
reply
19 points

So it sounds like basically it’s just client certificates?

permalink
report
parent
reply
14 points

Basically, but with a separate public/private key pair per login so they aren’t able to link your identity between sites or accounts with it and also synced or stored in a password manager so you don’t lose them.

permalink
report
parent
reply
5 points

Yep! In fact you can still use client certificates in certain passkey/WebAuthN authentication flows. It’s more or less how Windows Hello for Business works (although X.509 certificates are only one type of key it supports).

permalink
report
parent
reply
2 points

Basically but with better software and better branding.

permalink
report
parent
reply
37 points

We shouldn’t be getting rid of passwords, or one time passwords, or two factor authentication, or single use codes. The point of security is overlapping features is what brings convenience and deterrence.

permalink
report
reply
23 points

It’s probably overkill for most people but I would love to have a system that lets me choose what combination of factors together work to login rather than just ‘password and something else’. Something like A,B,C are on the account and you can use A+B or B+C to login. It’d be great for those who don’t necessarily want to trust SMS-based one-time passwords (due to SIM swapping, theft, etc) if we could require something else along with it.

That said, the way passkeys are typically used satisfy multiple factors at once:

Password to unlock your password database that stores your passkey: something you know, the password + something you have, the database

Biometric to unlock your phone that has your passkey: something you are, fingerprint or face + something you have, the phone

permalink
report
parent
reply
15 points

Forget about biometrics, they are way too insecure.

Our cameras have reached a stage where we can replicate fingerprints from photos. ‘What you are’ is useless when we leave part of us everywhere. And furthermore, in parts of the world, authorities can force you to unlock your device with biometrics but not with passwords.

permalink
report
parent
reply
10 points

Biometrics can be fine when they are layered on top of other authentication methods.

permalink
report
parent
reply
3 points

For many people it works well as a trade-off between security and convenience. It may not be for everyone though and that’s okay. Nothing stops you from using a password/passcode to secure your passkey instead.

permalink
report
parent
reply
13 points

SMS second factor is so bad! The really dumb thing in my opinion is the place that uses SMS to factor the most is banks. Now how dumb is that?

permalink
report
parent
reply
9 points

In the EU they have to use something stronger if available. SMS is only used if requested by the user.

permalink
report
parent
reply
4 points

Banks are certainly behind the times and ‘bank-grade security’ is a joke in terms of what authentication methods they offer. I understand that they are slow to change anything though.

permalink
report
parent
reply
2 points

I see SMS as a simple deanon rather than a 2FA.

permalink
report
parent
reply
20 points

Years ago I worked for a company whose servers were in a highly secure facility. I had to pass through a “person trap” to get in, which required three independent things to get through: something you have, something you know, and something you are.

Imagine a booth about the size of a phone booth, with doors on both sides. To open the outer door you need a card key. Once inside the outer door closes. To open the inner door you need to put your hand on a hand scanner, then enter a PIN. Only then will the inner door unlock and let you inside. I was told that the booth also weighed you and would refuse to let you through if your weight was something like 10% different from your last pass through. That was to prevent other people from piggybacking through with you.

Lots of people think that’s all overkill until I explain that it’s all to ensure an authorized person, and nobody else, could get through. A bad actor could steal my card key & might guess my PIN, but getting around my hand scan & weight would be extremely difficult.

The closer we get to this sort of multi-layer authentication with websites the happier I am. I want my bank account, etc. protected just as well as that data center…

permalink
report
parent
reply
2 points

Honestly that’s cool as heck

permalink
report
parent
reply
1 point

Was it like this?

permalink
report
parent
reply
1 point

I never screwed up entering my PIN or failed my hand scan, so the trap door never opened up while I was in it…

permalink
report
parent
reply

Technology

!technology@lemmy.world

Create post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


Community stats

  • 17K

    Monthly active users

  • 12K

    Posts

  • 543K

    Comments