The passkey ecosystem is far from complete, but Google's implementation is now ready to use.
See full article...
See full article...
The cynic in me wants to lean towards marketing at least from Google's end. I feel like I see less explanations of the mechanics of Passkeys and more Google shoehorning the phrase "death of the password" into as many news releases as possible.Why is there all this news pushing and pushing people to adopt something that is not fully ready? Passkeys replacing passwords or not, I find it very strange all these articles coming out constantly reminding us to switch to passkeys. There was literally one on Ars just last week.
That's why I bring a hardcopy of recovery codes with me when I travel.I recently had an experience while traveling where a phone fell and broke and was not usable and my friend had 2 factor authentication turner on with the Duo app as well as a password manager when they tried to get their new phone operational.
Were it not for breaking best practices and getting someone back home to log into their laptop my friend would have faced an expensive trip home to sort everything out.
This isn't to say that security isn't important, it's just I've been shown in a very real way that multi device authentication can be a very dangerous thing. If my friend had been limited to passkeys in this situation they would have been stuck because the old phone didn't work. And they wouldn't have had any way of turning off the passkey option except by getting someone else to do it for them .
That could be fun...I've been to some government facilities they won't let you bring in anything with wireless functionality or cameras (so no phones, no bluetooth/wifi devices, etc). If you need to log into something, you have to use a post-it note to record the 2FA code from your phone outside and bring the post-it note inside to type in is the "approved" flow (which is a PITA, that ought to be some kind of olympic sport badging thru gates and doors running on stairs to make it back to a computer before the code expires).I imagine all the desktop Windows computers used in businesses and government would need a whole lot of Bluetooth dongles to implement this.
The context of the article is logging into a Google credential with a passkey. The ‘big 3’ and also several others offer key escrow and recovery, but sites use passkeys directly- if you use a passkey with Best Buy, they will not be checking with Google for example (Unless you use ‘social logons’ of course). In that context, google wiping your account just means if your phone dies things could get dicey. They are basically a yubikey with a recovery option - so slightly less secure because the private key exists in escrow which solves 50% of the problem with yubikeys (the price tag and app support being the remaining pain).No and absolutely fucking not.
Every single system that seems to be able to store passkeys seems to require you to trust the big three (Apple, Google, Microsoft) not to delete your account without warning. In my case, if Apple deletes my iCloud account and the keychain, I lose access to everything that's secured with a passkey. Compare that to what happens right now, if I destroy my main Yubikey: I go to my bank, show them two forms of ID, use my physical key to retrieve the backup Yubikey from the safe box, and move on with life.
Until and unless there are serious and lasting consequences for companies that provide infrastructure services that act unilaterally, there is no way I will use this. KeyPass/BitWarden can generate arbitrarily strong passwords, you can buy as many Webauthn keys as you want from a variety of vendors. With passkeys, you're one (automated, non-negotiable) deletion away from being locked out permanently from your entire online life.
If you want to give that power to a company, be my guest. I'll wait until it's treated like water or power companies cutting off service for no apparent reason: large and hurting fines.
I have to wonder how much more secure it is in practice. It seems to me that it's a pretty complex system with lots of moving parts. The more complex something is, the more likely there are security issues.At least on the Apple side, passkeys are synced via iCloud Keychain. So if you have multiple devices, then passkeys will work on all of them. I can sign in seamlessly using my phone, my desktop Mac, my iPad, etc.
I think a lot of the problems and concerns around recovery and multi-device support go away once you start getting third party Passkey solutions from companies like 1Password and Bitwarden. Millions of people already trust them with all their passwords; trusting them with passkeys isn't really any different, but it is more secure.
That said, I do wonder about the "average user" problem. Passkeys are targeting people like my mom, who use the same few passwords everywhere. But there's no guarantee she'll stick with Android for her next phone, and she doesn't live inside the Google ecosystem everywhere - instead she has a hodgepodge of accounts. She's been doing things this way forever, and I'm not sure she'd be willing or even able to change now.
Guessing that'd be those terrible, horrible insecure passwords? Hmmm ....So what's the fallback if your phone is lost/stolen/destroyed/etc?
How do you ensure your recovery codes haven't been copied/compromised during the trip? I wouldn't want such a high-value document anywhere on my person or luggage when traveling, I'd want it locked up in a safe at home.That's why I bring a hardcopy of recovery codes with me when I travel.
As far as I can tell, the point of this is replacing the Thing You Know (i.e. the password) with a Thing You Have (your phone) in conjunction with the Thing You Are (biometric verification on your phone).
That is itself an improvement, but the downside is that there are way more moving parts, increasing the number of failure modes and making it harder to reason about them. The simplest question is: what happens if you lose your phone? Another one is: there are multiple Passkey implementations, right? How do they interoperate?
Speaking of moving parts, I'm somewhat concerned about the Bluetooth requirement. I don't think I've ever used a desktop computer with Bluetooth, for example. And how does the web page you're logging in to make an outgoing Bluetooth connection to your phone? Doesn't this require cooperation between the browser and the OS? What standards does this use? What happens if you're on a system which doesn't have this, for some reason? Is there a fallback?
Edit: Also, for a primer this document is kinda missing a simple explanation of what passkeys actually are and how they operate!
This is exactly it. Passkeys represent only a slight security improvement (and have some real usability issues at the moment) for someone who is rigorous about using a password manager, letting it generate strong passwords, and, crucially, always using auto-fill (since if you ever copy-paste a password, you can be phished just as easily as someone without a password manager). This represents a laughably tiny fraction of the people who need to authenticate with online services (which is, uh, much of the global population now). Password managers have failed outside of specific niches of IT professionals and the people they have policy making power over, but Passkeys hopefully stand a chance of succeeding.I think the ARS audience is way ahead of the curve in terms of using a password manager and having their credentials safely in order. Lots of normal people have no real system of keeping their passwords and have a total mess where they end up having to recover the password practically every time they login. Getting those people on to a secure and reliable system would be a big improvement for them. We'll see if passkeys are helpful for that. At this point it sounds way too confusing and incomplete to be something I'd suggest someone like that try.
The long and short of it is that with a few minutes of training, passkeys are easier to use than passwords
My phone is...usually somewhere in the house, though I regularly have to call it from a landline or use the "find my phone" to play a noise to find it probably once a week or so. And sometimes I am in a hurry and forget it on my way out to work.My phone is always in my pocket on the desk next to me, and I've been able to use fingerprint unlock even with peeling calluses from playing the guitar, or my fingertip coated in dried superglue (don't ask). I can see how passkeys aren't an improvement for everyone, but neither of these issues would put me off of it.
So, yeah, guess I'll switch this baby right on. Can't wait.There are some major parts missing in the passkeys ensemble. For now, Chrome on macOS needs its own local passkey. Firefox support isn’t yet available on macOS, and I couldn’t get that browser to work on Windows 10, either. Things are even more limited for Android. Currently, passkeys synced by Google don’t work with browsers [...].
ChromeOS has no support for passkeys at all. [...] Most glaring of all, Linux doesn’t work at all with passkeys.
This lack of seamless integration among OSes and browsers is the result of various players being further ahead or lagging behind their peers. Passkeys are a work in progress with many moving parts. [...]
Do you not bring your credit cards, cash, ID, even perhaps a passport with you when you travel?How do you ensure your recovery codes haven't been copied/compromised during the trip? I wouldn't want such a high-value document anywhere on my person or luggage when traveling, I'd want it locked up in a safe at home.
If you’re copy-pasting passwords (or typing them from memory, which has other problems at scale), you’re vulnerable to phishing. So passkeys would be a big security improvement for you.I'm not sure I understand how a workflow that requires
grabbing your phone,
tapping into an app,
taking a picture of your screen, and
tapping what to do with that info...
...is an "easier" operation than entering a password from memory, or auto-completing with a password manager, or copy pasting with a password manager.
There might be other benefits, but by no means is that easier.
It was 1400 words to that point, and included a bunch of caveats like "this browser/OS combo works, but not on this OS, needs your phone to be on you, etc". It sounds like a nightmare.With a basic primer on using passkeys out of the way,
If you use half decent passwords you're fine. The problem is most people don't use half decent passwords. They use a single or a small handful of passwords everywhere and they're something simple like the names of their kids and their birthday. This is a better solution for those kinds of people.I have to wonder how much more secure it is in practice. It seems to me that it's a pretty complex system with lots of moving parts. The more complex something is, the more likely there are security issues.
I get the theoretical improvement, but the devil is in the (implementation) details. I think I'd rather wait and see than jump in with both feet.
It sounds like this is not so much a "one-time requirement" as it is one time per account, per device. That's a big difference to me. I have well over a hundred accounts in my password manager. If I eventually switch those to passkeys, I will need a way to move them en masse between devices and platforms.The cross-device authentication process involving QR codes is a one-time requirement. Once completed, the user saves a passkey to the browser or platform being onboarded. This doesn’t seem like any more of a hassle than setting up password syncing on a newly installed browser.
Passwords are better than passkeys.
They can be changed, are not based on some item that can be lost or stolen, and are not based on some type of biometry.
Eh...
From what I understand this is a new industry standard and not just a Google thing. I'll wait for Apple and Microsoft to fully implement it before I bother, seeing how I don't really use Google products other than YouTube.
Editorial independence between the writers is a good thing! But a little editorial cohesion would be nice. Especially in this case where advice is being offered that contradicts other advice!Dan Goodin: Google passkeys are a no-brainer. You’ve turned them on, right?
Ron Amadeo: Switching [to passkeys] is probably a terrible idea right now
You do have a Ars Technica Slack, right? I'm wondering if there was a discussion there about the current maturity of Google's passkey implementation...
If you write an article to tell us that passkeys are great, and a bunch of people comment that they sound terrible, then something's wrong with the way you tried to convince us.Many of the criticisms so far are based on fundamental misunderstandings about passkeys. Going forward in comments, please don't criticize if you haven't tried it first.
I don't have a passport but the rest stays in my wallet and can easily be replaced if compromised.Do you not bring your credit cards, cash, ID, even perhaps a passport with you when you travel?
Change them when you get home. If someone wants to break into my room or rob me of those codes and also obtain my (strong) passwords all in a week or two window then they're welcome to them because at that point I'm being targeted by a nation state and their next option is to beat me with a wrench until I enter my password. Maybe I won't bring them if I'm traveling to Iran with state secrets in my email account I guess.
If you use half decent passwords you're fine. The problem is most people don't use half decent passwords. They use a single or a small handful of passwords everywhere and they're something simple like the names of their kids and their birthday. This is a better solution for those kinds of people.
Exactly. This only benefits the 99.9% of the population that doesn't follow good password practices. For the rest of us, it is just a hassle.Guessing that'd be those terrible, horrible insecure passwords? Hmmm ....
This seems such a terrible idea. If you know what you're doing, it seems neither easier nor faster nor more secure.