“Passkeys,” the secure authentication mechanism built to replace passwords, are getting more portable and easier for organizations to implement thanks to new initiatives the FIDO Alliance announced on Monday.

  • shortwavesurfer@lemmy.zip
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    Actually, it is still a problem, because passwords are a shared secret between you and the server, which means the server has that secret in some sort of form. With passkeys, the server never has the secret.

    • Programmer Belch@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      Best password manager is offline password manager.

      KeepassXC makes a file with the passwords that is encrypted, sharing this file with a server is more secure than letting the server manage your passwords

      • shortwavesurfer@lemmy.zip
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        I agree, and that’s my method as well. Although I do not ever share the file with a server either. I only transfer it from device to device with flash drives or syncthing.

        • a baby duck@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          How do you handle merging between devices? Do you manually transfer/sync every time you add a new password?

          Not trying to sell you on putting it in cloud storage or anything, but one really nice benefit to doing so is automatic merging through clients like Keepass2Android. If I add a new site to my phone and it doesn’t already have the latest copy of my vault, it’ll fetch and merge that first.

      • hikaru755@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        This is not at all relevant to the comment you’re responding to. Your choice of password manager doesn’t change that whatever system you’re authenticating against still needs to have at least a hash of your password. That’s what passkeys are improving on here

    • huginn@feddit.it
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      You can share passwords without the server seeing them. Many managers don’t but there’s nothing infeasible there. You just have a password to unlock the manager. Done.

      • shortwavesurfer@lemmy.zip
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        What I’m getting at is that a web server has a password, in some form. And so if that site gets breached, your password itself may not get leaked, but the hash will. And if the hash is a common hash, then it can be easily cracked or guessed.

        • theherk@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          Not anything sufficiently modern. Salted passwords should be exceedingly difficult to reverse.

        • huginn@feddit.it
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          Ultimately I’m pro passkey but when it comes to password managers: if the hash of your vault is easy to crack you’ve fucked up big time. There shouldn’t be any way to crack that key with current tech before the sun explodes because you should be using a high entropy passphrase.

    • Gutless2615@ttrpg.network
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      The shared secret with my Vaultwarden server? Add mfa and someone needs to explain to me how passkeys do anything more than saving one single solitary click.

      • 4am@lemm.ee
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        When a website gets hacked they only find public keys, which are useless without the private keys.

        Private keys stored on a password manager are still more secure, as those services are (hopefully!) designed with security in mind from the beginning.

        • weststadtgesicht@discuss.tchncs.de
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          If a website with old-school passwords gets hacked, the hacker only gets salted hashes of passwords - this does not seem to be much worse?

          (Websites that store plaintext passwords surely won’t implement passkeys either…)

      • shortwavesurfer@lemmy.zip
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        Pass keys are for websites such as Google, Facebook, TikTok, etc. And then they go into what is currently your password manager or if you don’t have one, it goes into your device. You still have to prove to that password manager that you are, who you say you are, either by a master password of some sort or biometrics.