The passkey ecosystem is far from complete, but Google's implementation is now ready to use.
See full article...
See full article...
It sounds like you don't understand how asymmetric encryption works. ICloud Keychain syncs the public key. It never sees or touches the private key.If they're synced using iCloud Keychain - then isn't there, by definition, a way to extract the keys from the device they're created on? Wasn't there an article just recently about new macOS malware that could steal iCloud Keychain items?
What I mean by cross-platform is:I don't understand your reasoning. Under today's password paradigm, Google can suspend your account anytime it wants. How does using passkeys make it easier for Google?
Also Google passkeys ARE ALREADY cross platform. My Google passkeys are currently being synced not just by Google, but also through the iCloud Keychain and Windows Hello. As you note, Bitwarden, 1Password and a bunch of other third parties will soon also provide syncing.
What's your basis for implying Google passkeys aren't already cross platform?
Your argument seemed to be that bringing a hard copy of 2FA codes (to be used only in the event you need them, like dropping your phone down a well) is too significant a security risk. I responded explaining why I didn't think so. I have no idea what you're trying to say here.Why would they need to compromise the codes and your password? If you can access the account using a password, they can just compromise the password, right?
The problem of dropping my phone down a well is not a problem if I only use a password. Then I just buy a new device and log in using the password.
You don't have to trust the big three to use passkeys. By all means, keep using passwords, but please inform yourself before commenting.No and absolutely fucking not.
Every single system that seems to be able to store passkeys seems to require you to trust the big three (Apple, Google, Microsoft) not to delete your account without warning. In my case, if Apple deletes my iCloud account and the keychain, I lose access to everything that's secured with a passkey. Compare that to what happens right now, if I destroy my main Yubikey: I go to my bank, show them two forms of ID, use my physical key to retrieve the backup Yubikey from the safe box, and move on with life.
Until and unless there are serious and lasting consequences for companies that provide infrastructure services that act unilaterally, there is no way I will use this. KeyPass/BitWarden can generate arbitrarily strong passwords, you can buy as many Webauthn keys as you want from a variety of vendors. With passkeys, you're one (automated, non-negotiable) deletion away from being locked out permanently from your entire online life.
If you want to give that power to a company, be my guest. I'll wait until it's treated like water or power companies cutting off service for no apparent reason: large and hurting fines.
Complexity concerns aside tying this to biometrics would enable warrantless access to accounts wouldn't it? It's already precedent that police can compel you to unlock your phone with biometrics but not force passcodes or patterns.
The fallback is to log in with your password the way you have done up to now. Remember, passkeys aren't either/or. You can create a passkey and still log in with a password.So what's the fallback if your phone is lost/stolen/destroyed/etc?
This is what frustrates me the most about the dialogue around passkeys. People have questions or make (wrong) assumptions. That may be frustrating but it's essentially based on a lack of understanding of how passkeys work. That's not their fault: that's down to passkeys being complex and (apparently) nobody having written an easy to understand explainer. But instead of educating people on the concept, the general response is "Stop spreading FUD about passkeys", "people are idiots for not getting it", or only addressing part of the question/assumption and either deliberately or accidentally not addressing some vital part of their question.Exactly.
Nobody can respond with any kind of workflow diagram or white paper show-casing that all the criticism is invalid. People are just responding saying it's invalid without anything to actually back it up.
Most people aren't going to uproot their entire digital process on a whim without actually understanding it.
Ron wrote two articles about passkeys, two days apart:I only see two articles from Ars in the past week (one was the same story renamed, but shows up twice in the search results).
View attachment 55642
The first is a news story about how Google now supports passkeys by Ron, and the second is a deep dive by Dan. This type of coverage is pretty common from Ars - a shorter news story covering a new product, feature or press release, and then a more in-depth story a few days later that goes into details, sometimes by a different editor who may have a different focus.
I can't speak to every other tech site you read, but I doubt there's any kind of "agenda" here. Companies put out press releases and updates all the time, and so you will see coverage hit from multiple sites at around the same time. Sites also want to maximize the amount of mileage they get out of any one topic, so they will often post multiple stories for the same news beat. I don't think this is evidence of a vast conspiracy to dupe everyone into giving up control over their digital security, or Ars being on the take from big tech, or whatever.
This model of tech news coverage happens for literally everything, so if this worries you, then fair enough. But it's not like coverage of passkeys is too different from any other product or service related tech news. I also appreciate Ars doing deeper dives and offering additional commentary - many other news sites just lightly reword press releases and move on.
Does that not undermine the security advantages of passkeys? If you have to leave passwords enabled as a fallback, then won't that just be the attack vector?The fallback is to log in with your password the way you have done up to now. Remember, passkeys aren't either/or. You can create a passkey and still log in with a password.
How do passkeys make it easier for Google to suspend your account? Isn't it already trivial for Google to suspend your account under the current password system?Having had a google account arbitrarily suspended, then having to deal with google's support to try and figure out why ... there is no way I am putting all of my authentication eggs into google's basket.
Definitely not a luthier! I have repaired a couple of guitars in my day, but never done any fret work; you're braver than I am!Well now I do have to ask: Are you a luthier, perchance, or just repairing instruments here and there? Either way, the glue-covered hands reminded me of the last time I did any fret work on one of my guitars. Coincidentally(-ish) it also reminded me of why I let a local shop do my fret repairs, these days![]()
The fallback is to log in with your password the way you have done up to now. Remember, passkeys aren't either/or. You can create a passkey and still log in with a password.
And long on unbridled sycophancy, apparently.
This is the front page Dan. Long on hot-takes, short on educated, informed analysis.
How exactly do passkeys make any single company the gatekeeper of all your online logins. Currently, you can store a passkey for a given account in the Microsoft, Apple, and Google clouds, and soon you will also be able to use 1Password and many other third parties. There is zero reason to use only one gatekeeper if you don't want to.I don't want to make any single company the gatekeeper for all my online logins. If I lose access to that account I lose access to all my accounts.
And I don't want to make it dependent on any single physical device. Lose the device, lose all access.
Generated strong passwords kept in a password manager neatly avoids both issues.
Ars alone has published 5 Passkeys are killing passwords articles in 7 months. Three of which are in the last week. That's not just covering new tech stuff, that's pushing a narrative. Look at the non-tech sites saying "Google and Apple are killing passwords!" It's been going on for the last 1-2 months pretty constantly on the same websites.
No one is telling anyone to "switch to passkeys." This article is suggestion anyone who wants to use 2FA to give passkeys a try. Again, passkeys aren't an either/or thing. Turning on passkeys doesn't prevent you from using passwords at any time. What, exactly, is strange about an article that encourages people to give passkeys a try?Why is there all this news pushing and pushing people to adopt something that is not fully ready? Passkeys replacing passwords or not, I find it very strange all these articles coming out constantly reminding us to switch to passkeys. There was literally one on Ars just last week.
How do passkeys make it easier for Google to suspend your account? Isn't it already trivial for Google to suspend your account under the current password system?
Ars writers are encouraged to be independent thinkers. Ron and I disagree. So what. Is your preference that all Ars writers march in lockstep behind perspective that's mandated by the management?Dan Goodin: Google passkeys are a no-brainer. You’ve turned them on, right?
Ron Amadeo: Switching [to passkeys] is probably a terrible idea right now
You do have a Ars Technica Slack, right? I'm wondering if there was a discussion there about the current maturity of Google's passkey implementation...
1password feels safer but it no longer supports local backup, so for me it does not feel safe enough.Personally I'm waiting until 1passsword supports them. I may purchase a yubikey once it does.
Are there any privacy concerns here?
So like an SSH key, only more complicated. Terrific.Fair enough. I just updated to the post to add:
From Apple:
The FIDO specs require that whatever syncing mechanism a user elects (be it from Apple, Microsoft, Google, or a third party) it provide end-to-end encryption the way iCloud Keychain and password syncing currently do. This means that the private key is unknown to the cloud provider. They private key resides on the device and can only be accessed by unlocking the device using either a unlock PIN, a fingerprint or face scan.
The app is the Camera. On iOS, pointing the normal camera app at the QR code shows a small yellow label/link saying "Sign in with a passkey". Dunno what Android does, but I'd wager it's similar.
View: https://imgur.com/a/35HQNvh
It seems like you didn't:Now I read a story
You probably don't use gmail I would guess, yet that doesn't really impact your opinion on email as a communication standard and service.The FIDO specs require that whatever syncing mechanism a user elects (be it from Apple, Microsoft, Google, or a third party)
The keychain is encryptedIf they're synced using iCloud Keychain - then isn't there, by definition, a way to extract the keys from the device they're created on? Wasn't there an article just recently about new macOS malware that could steal iCloud Keychain items?
If the attacker has the ability to unlock your device they can log in to your account. But by definition a person with the ability to unlock your device (think your iPhone or Android phone) already has access to your account at a minimum, and if you're like many people and sync passwords to that device, they have access to all your accounts anyway.A question.
If a device with passkeys is fully compromised; does the bad actor now have access to authenticate to all of my accounts everywhere from that device (since he has the passkeys and is passing whatever security that particular device uses)?
I mean: I realize that my Yubikey has a similar problem (if someone physically has it, they can get to all my stuff), so this isn't necessarily new; but still.
Why not simply bring a couple Yubi keys with you when you travel. How is bringing a hard copy easier?That's why I bring a hardcopy of recovery codes with me when I travel.
If only there was a device you could use to authenticate with that didn't require wireless communication. And it'd be great if this device could be used in places with strict compliance requirements. If only.That could be fun...I've been to some government facilities they won't let you bring in anything with wireless functionality or cameras (so no phones, no bluetooth/wifi devices, etc). If you need to log into something, you have to use a post-it note to record the 2FA code from your phone outside and bring the post-it note inside to type in is the "approved" flow (which is a PITA, that ought to be some kind of olympic sport badging thru gates and doors running on stairs to make it back to a computer before the code expires).
I assume government would want something without wireless...though many also seem to ban things that look like thumbdrives (and one I've been to for someone's retirement ceremony actually required I empty my pockets TSA style to be examined entering to check for contraband).
Bluetooth is one way to prove proximity to your device, but it's not the only one.Among numerous issues that make me skeptical, the bluetooth requirement is a hard "No".
Disabled on my phone since day 1, and never on my laptop.
Complete dogshit communication protocol, and should never EVER be part of any authentication scheme.
Pure nonsenseGuessing that'd be those terrible, horrible insecure passwords? Hmmm ....
This seems such a terrible idea. If you know what you're doing, it seems neither easier nor faster nor more secure. I would rather not trust all my security to having a second device with me. And I worry about the power border agents have to compel device biometrics, and through that, access to everything you have a login for.
"You've turned them on, right?" Dear gods, the idea of becoming an early adopter for such a revolutionary and disquieting concept where the bugs are yet to be ironed out, is ... nuts. Even if I was excited about this, I would be waiting half a year before turning them on. The risks of unpredicted edge cases are far too great here.
It's just not.
Passkeys are more secure than passwords, and so yes I am using them as much as I can (my primary computer, a desktop, doesn't have any biometrics so I can't use them there),
I am strongly unwilling to base all my security on any system that is dominated by the likes of Google, Microsoft, Apple, et al.Well, passwords it is then.![]()
Honestly I am going a bit further than that.
As I've been thinking about this a lot lately. This shifts the burden nearly to be entirely client's fault if this gets fully implemented. Database/password breaches are no longer what compromise individuals, but rather a loss of physical device or pressing "allow" on their passkey manager. This is a significant shift in liability if anyone's account were to get popped in the future as they can claim that nothing on their end can prevent this.
And this huge PR push/partial astroturfing claiming it will kill passwords without actually going into said details makes me continue down this rabbit hole.
Not only that, but unless they truly enforce the bluetooth requirement (which I highly doubt because that would effectively block people from granting temporary access to family/friends that are far from them) then as a single factor, this doesn't actually provide the common-person very much security benefits, but provides corporations huge liability benefits.
It sounds like you don't understand how asymmetric encryption works. ICloud Keychain syncs the public key. It never sees or touches the private key.
It's a shame this post is so highly upvoted, because it's based on a fundamental misunderstanding. You need to have your phone to scan the QR code exactly once when logging in from a new device. After that you won't be "having to go find your phone. As for having to "go thru some setup for fingerprints," anyone who has set up Face ID or fingerprint scanning on their Mac, iPhone, Android device, or Windows computer has already done this. And if your device doesn't support fingerprint or face ID, you can always simply enter the unlock PIN.
tl;dr: despite all the upvotes, this comment is misinformed.
Can you explain how passkeys make it easier from Microsoft et al. to "nuke your account"? Even if these companies could delete the passkey from your device, what exactly would stop you from simply logging in with your password the way you always used to?