Passkeys are built on the FIDO2 standard (CTAP2 + WebAuthn standards). They remove the shared secret, stop phishing at the source, and make credential-stuffing useless.

But adoption is still low, and interoperability between Apple, Google, and Microsoft isn’t seamless.

I broke down how passkeys work, their strengths, and what’s still missing

  • Rooster326@programming.dev
    link
    fedilink
    English
    arrow-up
    1
    ·
    19 hours ago

    password managers have relatively low adoption and plenty of people are walking around with poorly managed credentials

    All of the modern browsers have built in password managers so I doubt that very much.

    Are they as secure as your self-hosted bit warden that is not accessible via the Internet? No.

    But it does still keep track of your usernames and even alerts you if you have a breach.

    • jj4211@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      8 hours ago

      Ok, I’ll concede that Chrome makes Google a relatively more popular password manager than I considered, and it tries to steer users toward generated passwords that are credible. Further by being browser integrated, it mitigates some phishing by declining to autofill with the DNS or TLS situation is inconsistent. However I definitely see people discard the suggestions and choose a word and think ‘leet-speak’ makes it hard (“I could never remember that, I need to pick something I remember”). Using it for passwords still means the weak point is human behavior (in selecting the password, in opting not to reuse the password, and in terms of divulging it to phishing attempt).

      If you ascribe to Google password manager being a good solution, it also handles passkeys. That removes the ‘human can divulge the fundamental secret that can be reused’ while taking full advantage of the password manager convenience.