Those are awfully dangerous on their own these days.
As soon as a poorly salted hash leaks or gasp, a hash with no salt, it’s super easy to reverse those passwords now.
2FA severely reduces the danger of rainbow tables and keyloggers. The only real worry with 2FA is login replacement and interception. and passkey solves that, allbeit at the cost of complexity.
baby steps, start with getting them secure, then when most are ready start dropping the password
iron out the kinks, give all apps a chance to implement
if you only ever login with passkey and it asks you for 2fa, you can scrutinize the page more
You can tell just from the response on this post people aren’t all ready for passkey yet, but you can’t wait fo them to decide they’re ready before you start.
You can have more than one passkey.
You can still use password + 2fa
You can use google oauth.
You can use a YUBI key
You should probably have a primary and secondary auth for every site.
Or just a password that is known to you and only you.
Those are awfully dangerous on their own these days.
As soon as a poorly salted hash leaks or gasp, a hash with no salt, it’s super easy to reverse those passwords now.
2FA severely reduces the danger of rainbow tables and keyloggers. The only real worry with 2FA is login replacement and interception. and passkey solves that, allbeit at the cost of complexity.
What’s the point of a passkey if you can still use a password
You can tell just from the response on this post people aren’t all ready for passkey yet, but you can’t wait fo them to decide they’re ready before you start.