The passkey ecosystem is far from complete, but Google's implementation is now ready to use.
See full article...
See full article...
Source: https://connect.mozilla.org/t5/ideas/support-webauthn-passkeys/idc-p/30123/highlight/true#M17028
- WebAuthn Level 1 + CTAP2 is riding the trains for Fx 114
- WebAuthn Level 2 + 3 are planned to ride the Fx 116 train
- Passkeys (though details are still about to figured out) earliest completion is Fx 120
I don't see how this would solve spear phishing with password replay attacks. Most phishing MITM just replays the input to the server and replays the output to the victim, usually with a redirect at the end. Those types of attacks still work against TOTP MFA devices too, so those aren't really the attacks people are trying to prevent here.Phishing and spear phishing is no longer a problem because HTTPS is nearly ubiquitous?
Also (much lower frequency but believe me that it’s a huge one for nation states) all the various forms of remote key loggers are mitigated by HTTPS?? Personally, if I were paranoid about being targeted in that way and needed to log in to Google on a fresh computer I’d prefer to point my phone at a QR code on the screen for 2 seconds, than slowly type out a strong password on the keyboard.
And in the context of this article do you really think Google are storing our Google account credentials in an exposed unencrypted database?
I do 100% agree with you that a longer term improvement would be to fully replace passwords with passkeys, to close off the legacy weaknesses in the password system.
Here’s my suggestion for how we get there: for phase 1 a big ubiquitous online player should do a parallel rollout of passkeys alongside passwords as a real world demonstration to get momentum, then for phase 2 all of the cloud keychain and third party password manager companies should discuss how to enhance interoperability and the OS and browser vendors should concurrently implement passkeys in their systems. This would mirror the success story with HTTPS and the security benefits it brought to the ecosystem.
At a known point early in this plan, arstechnica could write an article about what works/what doesn’t /what is planned in the future….
It obviously must be available not only during syncing, but also during authentication, since it's used for it. And it also has to be available during initial registration.
And that's what I'm trying to explain to you: It would be easy to authenticate with an existing device, and use that device to add an other public key, which is generated on an other, new, device, and sent to the old device by some means. For example, I could create a new secret key / public key keypair on my desktop machine, send the public key to my laptop, log in with my laptop, and add the desktop public key. I do similar things with SSH all the time.
There's no technical hurdle here. If that's not possible with passkeys, then that's by choice.
I do a factory reset on my phone and tablet roughly every 90 days.Sigh. Here we go again. The passkeys topic brings out the worst in the comments here and HN. Lots of paranoia and general spreading of FUD.
None of the “big three” tech companies will be getekeepers to your passkeys. Passkeys are held on a device. If you don’t want to sync your passkey via some sort of service then put the same passkey on multiple devices. You only have one device And now it’s gone? That is the same problem as password managers without sync. In the end you will have to reauthenticate with different services just like you would in any similar case of being locked out. Most people will sync their passkeys like they do their passwords. And no, if Google shuts down your account they can’t disable the passkeys you already have on your devices. You’ll lose their sync service but you could then start using another one instead.
Passkeys can’t be phished, can’t be forgotten, can’t be gotten through data leaks, and are inherently unique and secure. Those are really big improvements. They are also easier to use because once they are on your device authentication is simple.
You’re confusing yourself once again. None of the quote implies anything about deleting passwords. I hope they do delete passwords for their own accounts at some point but that’s realistically decades in the future if it ever happens, once most of the edge cases have been solved or gone away and when most of the rest of the internet has made passkeys a ubiquitous option.Yeah dude, totally:
https://security.googleblog.com/2023/05/so-long-passwords-thanks-for-all-phish.html
Either passkeys are a great, more secure alternative to passwords - in which case Google has every reason to try to remove passwords. Or passkeys are just a simple alternative that doesn't actually do anything because there's a password fallback that can be used for the exact same verification.
If it's the former, then why are you trying to argue that Google isn't pushing passwords out (as their multiple blogs clearly imply is in the future).
Unless, because nobody has an answer as to how they do this because they still have password fallback and literally zero of the FIDO docs, Google, Apple blogs say anything about how they are going to implement fallback without passwords that you are subconsciously aware that they can't possibly be talking about removing password fallback. In which case, I redirect you to my original point, which is that passkeys are useless with password fallback.
You won’t lose any accounts and you definitely have not understood the way passkeys authenticate.I do a factory reset on my phone and tablet roughly every 90 days.
I reformat the os drive of my computer, and install a new distro roughly every six months.
If I understand the way passkeys authenticates things, I'll lose all of my accounts within six months.
No thanks.
Of course they don't plan on deleting everyone's passwords in the near future. Because they don't know how to get rid of password backups. But the messaging of their titles "Goodbye passwords, thanks for all the phish" and "Maybe next password day, you won't need to remember your password!" are very implicative of actually not needing passwords. Which is a disservice to users and gives the false implication that passkeys are more secure than passwords, even with password based backups being able to do 100% of what passkeys can do.You’re confusing yourself once again. None of the quote implies anything about deleting passwords. I hope they do delete passwords for their own accounts at some point but that’s realistically decades in the future if it ever happens, once most of the edge cases have been solved or gone away and when most of the rest of the internet has made passkeys a ubiquitous option.
Look at how long it’s taking to get 2FA rolled out for any more than a small fraction of the deep web!
So yes, I think a few Google blog posts saying ‘many devices don’t support passkeys yet’ and ‘we will apply closer scrutiny to password login activity because we believe those are the weak link’
is NOT the same as:
‘we plan to delete everyone’s Google account passwords in the near future’
I don't have any problem with the passkeys themselves, but I'm just a bit disturbed to discover that Chrome can that easily manipulate my Bluetooth adapter whenever and however it likes. Even on Ubuntu.
I disabled BT to see what would happen, and sure enough, Google complained that it couldn't reach my phone... and offered to turn BT on for me. That, at least, did not work. Yet. (I assume it does work that way on Windows, and possibly MacOS as well.)
To be extremely clear, again, this has nothing to do with the passkeys themselves; as an authentication standard, they're fine. I am just not in love with how much control the browser has over my hardware (because the more control it has, the more control an attacker who owns the browser has).
Passkeys are actually a huge benefit for your particular use case and it’s one thing that I’ll benefit from too (supporting aging family members).I'm all for the IDEA of using passkeys in general, but it does have some serious limitations... for myself, the lack of support for computers (MANY desktop PCs) without Bluetooth is a pretty big one. Additionally, the lack of Linux support is a big deal for me personally - hopefully someone will create a self-hostable passkey storage system (there would obviously need to be some way to add your self-hosted passkey server URL or similar when adding a passkey to a service).
Another big issue though is one I already have to deal with with 2FA (though I use and support 2FA generally) - I do a lot of technical support for older people, and sometimes need to do things remotely, on their behalf. With 2FA it's extremely difficult to log into someone else's account (Google, etc.) to change a setting, look something up, help them recover or reset a password, etc.. This is of course intentional and generally a good thing, but it does complicate technical support. Passkeys seem even worse for this purpose than 2FA, since at least with 2FA I can call them and ask me to read a code displayed on their phone, or tell them to tap whatever prompt is displayed.
Well, shit, I change devices and OS much more frequently than that. Must have lost my passkey…. Oh … all of never times.I do a factory reset on my phone and tablet roughly every 90 days.
I reformat the os drive of my computer, and install a new distro roughly every six months.
If I understand the way passkeys authenticates things, I'll lose all of my accounts within six months.
No thanks.
Did you forget that the article last week said it's not ready for prime time?
The iCloud Keychain (and Windows Hello and Google Cloud) absolutely do NOT (sorry) have the private key. The private never leaves the device.
Synchronization security
Passkeys were designed to be convenient and accessible from all devices used on a regular basis. Passkeys sync across a user's devices using iCloud Keychain.
iCloud Keychain is end-to-end encrypted with strong cryptographic keys not known to Apple and rate limited to help prevent brute-force attacks even from a privileged position on the cloud backend, and are recoverable even if the user loses all their devices.
Apple designed iCloud Keychain and keychain recovery so that a user's passkeys and passwords are still protected under the following conditions:
- A user's Apple ID account used with iCloud is compromised
- iCloud is compromised by an external attack or an employee
- A third party accesses user accounts
Recovery security
Passkey synchronization provides convenience and redundancy in case of loss of a single device. However, it's also important that passkeys be recoverable even in the event that all associated devices are lost. Passkeys can be recovered through iCloud keychain escrow, which is also protected against brute-force attacks, even by Apple.
iCloud Keychain escrows a user's keychain data with Apple without allowing Apple to read the passwords and other data it contains. The user's keychain is encrypted using a strong passcode, and the escrow service provides a copy of the keychain only if a strict set of conditions is met.
To recover a keychain, a user must authenticate with their iCloud account and password and respond to an SMS sent to their registered phone number. After they authenticate and respond, the user must enter their device passcode. iOS, iPadOS, and macOS allow only 10 attempts to authenticate. After several failed attempts, the record is locked and the user must call Apple Support to be granted more attempts. After the tenth failed attempt, the escrow record is destroyed.
Optionally, a user can set up an account recovery contact to make sure that they always have access to their account, even if they forget their Apple ID password or device passcode.
Perhaps I wouldn't have made such an assumption if I had ever seen anything at all to indicate that Thunderbird would have support for Passkeys any time soon. Given how long it took for OAuth support to get added, I think it was reasonable to conclude it wouldn't be a thing I could do in Thunderbird.WebAuthn already integrates seamlessly with Gmail on Thunderbird.
This comment is yet another example of someone not asking questions, but confidently making an assertion (that passkeys won't work in your environment) based on a technically inaccurate understanding. Rather than jump to conclusions, why not investigate a little first?
I do a factory reset on my phone and tablet roughly every 90 days.
I reformat the os drive of my computer, and install a new distro roughly every six months.
If I understand the way passkeys authenticates things, I'll lose all of my accounts within six months.
No thanks.
They actually have - if you know how to translate the marketing speak "Passkeys" into the technical spec: "multi-device credential" or "backup-eligible credential".Yup. If they actually publish how they plan to remove passwords as backup auth, passkeys could be excellent.
Credential backup eligibility and current backup state is conveyed by the BE and BS flags in the authenticator data, as defined in Table .
The value of the BE flag is set during authenticatorMakeCredential operation and MUST NOT change.
The value of the BS flag may change over time based on the current state of the public key credential source. Table below defines valid combinations and their meaning.
BE and BS flag combinations
BE BS Description 0 0 The credential is a single-device credential. 0 1 This combination is not allowed. 1 0 The credential is a multi-device credential and is not currently backed up. 1 1 The credential is a multi-device credential and is currently backed up.
It is RECOMMENDED that Relying Parties store the most recent value of these flags with the user account for future evaluation.
The following is a non-exhaustive list of how Relying Parties might use these flags:
- Requiring additional authenticators:
When the BE flag is set to 0, the credential is a single-device credential and the generating authenticator will never allow the credential to be backed up.
A single-device credential is not resilient to single device loss. Relying Parties SHOULD ensure that each user account has additional authenticators registered and/or an account recovery process in place. For example, the user could be prompted to set up an additional authenticator, such as a roaming authenticator or an authenticator that is capable of multi-device credentials.- Upgrading a user to a password-free account:
When the BS flag changes from 0 to 1, the authenticator is signaling that the credential is backed up and is protected from single device loss.
The Relying Party MAY choose to prompt the user to upgrade their account security and remove their password.
Sure looks about the same to me...and I'm guessing to places that say "no thumbdrives" would agree?
I see a plastic/metal stick with a USB connector on the end in the Yubikey marketing...much like the sampling of thumbdrives from google images. Though if it has Bluetooth would also mean places that allow USB but don't allow personal wireless electronics would probably take it away.
You don’t even understand how passkeys are a strong mitigation against phishing and MITM attacks? Then why are you filling the comments with misinformation when you haven’t done basic research? This was all explained clearly in the articles you have been very vocal in the comments.I don't see how this would solve spear phishing with password replay attacks. Most phishing MITM just replays the input to the server and replays the output to the victim, usually with a redirect at the end. Those types of attacks still work against TOTP MFA devices too, so those aren't really the attacks people are trying to prevent here.
If we are talking about nation state actors, they are just going to target the tech support of whatever they want access to so discussing technology to prevent that is meaningless.
And no, I never said Google was storing passwords in an unencrypted database. That's not how credential stuffing attacks occur. Usually people re-use passwords in multiple locations and the weaker sites expose the same passwords that were used on the sites that take their back-end more securely.
I agree with your suggestions for rolling out, with one caveat - actually publish a white paper that doesn't dabble in theoreticals such as the FIDO one claiming that users "probably" will have a second device to restore if their first device is lost. And this same white paper also shouldn't just suggest that passwords are used as the fallback for new devices, it should actually lay out the plan to fully remove passwords -- because that's the end goal right? We should know the steps we are going to take before we get there.
There is a lot of confusion here, I think because an entire tech stack has been dumped on us and presented as a fait accompli. Let me, as an ignoramus, try to deconstruct it by analogy with what I do understand: SSH key pairs. I invite others to pick holes in what I get wrong.
1. Public/private authentication keys. This works roughly the same as SSH. The website only knows your public key, and you sign messages to prove you hold the private key.
2. Anti phishing protection. Keys are specific to a site, so a phishing site gets a different key. SSH has host keys for this, I assume keypass uses something to do with TLS host keys? Your browser uses that to select which key to use? Or just by DNS name?
3. Means of unlocking the keys to prove the right user is using them. SSH has passphrases, I assume this is where the biometric / Bluetooth thing comes in? SSH can also unlock keys with smartcards, and so I assume the biometric is a bit like another unlock mode?
4. Syncing keys between devices. This is presumably where cloud ‘ecosystems’ come in, like iCloud and Chrome password sync? For SSH there’s no support, but you can cook up your own with rsync or whatever?
What did I get wrong?
If the above is broadly right, I could imagine building an open stack that basically does the same as SSH does using a pile of files in ~/.ssh and rsync to move between devices. That is the ‘bicycle’ approach where all the moving parts are exposed and easy to understand what’s going on.
The FIDO specs require that whatever syncing mechanism a user elects (be it from Apple, Microsoft, Google, or a third party) it provide end-to-end encryption the way iCloud Keychain and password syncing with browsers currently do (on Chrome, this E2EE must be turned on).
Since the entire point of the passkey system seems to be to get rid of passwords, let me list some of the benefits of passwords:
- they are simple enough to understand for anyone mentally capable of operating an electronic device
- they are easy to remember if you make any effort at all and regularly use them
- they work on all operating systems out of the box
- they don't require Internet access (some systems are offline for a good reason)
- they don't require the cooperation of any third party
- they don't require the presence of a smartphone or other gadget
- they don't require Bluetooth, WiFi, cameras or batteries
- they can - in an emergency - be stored without the need of electricity
- they can be easily transmitted to another person without the use of any device
- if you are not handicapped and not using a smartphone, authenticating with a password takes only a few seconds
If I have a Passkey on my old Android phone, how do I transfer or set it up on a new Android phone?
When a user sets up a new Android device by transferring data from an older device, existing end-to-end encryption keys are securely transferred to the new device. In some cases, for example, when the older device was lost or damaged, users may need to recover the end-to-end encryption keys from a secure online backup.
To recover the end-to-end encryption key, the user must provide the lock screen PIN, password, or pattern of another existing device that had access to those keys. Note, that restoring passkeys on a new device requires both being signed in to the Google Account and an existing device's screen lock.
It obviously must be available not only during syncing, but also during authentication, since it's used for it. And it also has to be available during initial registration.
And that's what I'm trying to explain to you: It would be easy to authenticate with an existing device, and use that device to add an other public key, which is generated on an other, new, device, and sent to the old device by some means. For example, I could create a new secret key / public key keypair on my desktop machine, send the public key to my laptop, log in with my laptop, and add the desktop public key. I do similar things with SSH all the time.
There's no technical hurdle here. If that's not possible with passkeys, then that's by choice.
I am not talking about other services. Google has posted (at minimum) 5 blog posts saying passkeys will kill passwords, yet have never once detailed how passkeys will operate in isolation of said passwords. I used bluetooth to try and get my point across - which is that it does not matter if Google accounts work well for most people, passwords are still being used as a backup - which defeats the entire purpose of passkeys as a whole.
If passwords are used as a backup then there is zero point to passkeys. Passwords will still be in auth DBs, passwords will still get leaked, passwords can still be used to take over people's accounts. Passkeys, in their current shape and form, are pointless unless passkey-only users have a way to add new devices without passwords.
Fallback options aren't just options - from a security standpoint it determines whether or not the security mechanism actually makes an improvement of the overall security of authentication or not.
It's not whataboutism if the scenario in effect makes the service useless and pointless across all scenarios. And until there is a workflow that allows you to fully disable password backups and maintain the same abilities that passwords grant (access to accounts via any device) then this problem will be there.
If I design a garage door opener that uses PKI and nobody could ever imitate my opener's communication with my garage but create a fallback where it accepts a regular garage door opener's codes. Guess what, the fallback makes my new opener completely useless.
It's not noise when the fallback nullifies the advantages of the technology.
It's actually CTAP 2.2 and WebAuthn 3.It's not just dumped on people - this is an update to FIDO2, itself the second version of the standard. U2F was FIDO1; this is CTAP 2.4 (I think, I'm pull the number from memory and I could be wrong), part of FIDO2/WebAuthn. This is really nothing complicated as that goes.... they've loosened up the Authenticator requirements so that the private key can be (must be...) copied securely, and added some Javascript features to make life easier. Passwordless logins? Always been possible with FIDO2. That's the neat part of it - FIDO1 could only be MFA. Adding a private key to your browser stored in the TPM or secure element? Always been possible, and was previously implemented in Chrome, Firefox and Safari. What's new is that it can be synced, and accessed via the BT/QR rigmarole. Previously, it was referred to (and flagged to web sites) as "platform specific keys", as opposed to the portable ones which were hardware devices. Now it's PassKeys.
Like when they find the post-it note stuck to your computer monitor?Since the entire point of the passkey system seems to be to get rid of passwords, let me list some of the benefits of passwords:
- they can be easily transmitted to another person without the use of any device
Thank you! This should be in the articles talking about passkeys, not on page 14 of a comments section.They actually have - if you know how to translate the marketing speak "Passkeys" into the technical spec: "multi-device credential" or "backup-eligible credential".
The current draft spec for the Webauthn is here: Webauthn
When you register a passkey, the website can see that it's a multi-device credential, and if the private key is backed up. In that case:
(Relying Party = Webserver, in their terminology, "Client" = Browser, "Authenticator" = Yubikey, for example, or the one built in to the phone or computer "Platform Authenticator")
So after you generate a passkey and back it up, the server can know and suggest that you remove your password.
Firefox support timeline for Passkey support (still a while away, not just on MacOS):
Source: https://connect.mozilla.org/t5/ideas/support-webauthn-passkeys/idc-p/30123/highlight/true#M17028
Update: found a more recent timeline
Sorry to contribute to this train wreck, but WHAT are these places saying “no thumbdrives”? I can’t think of any context involving personal devices where this makes sense.
The account you are responding to seems to (possibly purposely) misunderstand that Google is somehow in the loop of using a passkey to login to another site. The words “Google passkey” in succession in a headline seems to have scrambled some brains to think this is a service provided by them making people dependent on Google’s good will or whatnot.If you're logging in to Google with a password, you are already placing huge trust in Google authentication. Passkeys require no more or less trust than what you already are placing in Google. Google account passkeys aren't "authentication methods for the rest of your life." You can use your password anytime you like, and you can delete the passkey any time you want.
It's actually CTAP 2.2 and WebAuthn 3.
They finally published a working draft - it's here:
The QR code thingie ended up being called Hybrid Transport (section 11.5). There's lots of "cable" strings in the protocol surely because it was based on Google's version called "cloud assisted Bluetooth LE".
Sure, of course you should follow your employer rules with their devices. Hot tip: if they superglued your usb ports shut, maybe you’re not supposed to add your personal accounts on there.Not personal devices but companies and especially government. There are two concerns: the first is simply that USB storage is local storage and potentially risky — e.g. people have done tests where you can drop USB keys in the parking lot next to a building and some fraction of people will plug them into their work computer, which would be a great way to sneak malware into a secured network. The other is for any place which has data they want to avoid losing control of: if you can use a thumb drive, you can copy data on to it and take it out of the building where it can potentially become a disaster (intentional or not) — imagine if someone in HR wants to work at home and then drops the key with thousands of personnel records on it and you have to do a breach disclosure for all of them just in case someone malicious finds it.
The easiest answer in both cases is to block USB mass storage devices so you can allow things like keyboards and microphones but not storage. That still offers some attacks — a famous old one was https://lcamtuf.coredump.cx/plasma_globe/ — so places might go even further. It's been a while but a couple decades back when I was at a local security meetup with some people from the Navy SPAWAR facility, they said their protection system was a tube of epoxy: it was cheaper to pay someone to chisel it off while someone else watched to replace broken keyboard a few times a year than it was trying to figure out all of the possible ways someone could exploit something like USB, Firewire, etc. That's an extreme case but it is worth remembering that if you have any real cost to losing control of your computers or data it might be cheaper to limit how people can connect to the computers holding that data. I know people work in regulated industries who have certain things they can only do on locked-down terminal servers for the same reason — there's an upper bound to how quickly you could exfiltrate data if someone has to OCR a remote desktop session while they hold down the Page Down key.
I don’t agree with you - registering an account with passkeys is effortless compared to setting up “enter username, next, enter password, next enter 2FA code/confirm prompt”. Signing in is totally effortless compared to juggling passwords and 2FA credentials.I’m late to this party but yeah… I already find the “enter username, next, enter password, next enter 2FA code/confirm prompt” workflow to be irritating but I understand the benefit to me and my employer. This… is just too much for me vs the risk of getting phished when I already have unique auto-gen passwords and MFA on everything that can accept it.
The average Joe or Jane who needs this the most can’t even recall their passwords without writing them down and can’t sort out a password manager is out long before I’m even irritated. They won’t be able to set this up alone and if someone walks them through setup, the first time they encounter this flow they’re going to fly into a rage. I have helped the “computer illiterate” do basic tasks like sign up for email. A trivial, two minute exercise for Ars Readers is a half hour in hell for them.
Not personal devices but companies and especially government. There are two concerns: the first is simply that USB storage is local storage and potentially risky — e.g. people have done tests where you can drop USB keys in the parking lot next to a building and some fraction of people will plug them into their work computer, which would be a great way to sneak malware into a secured network. The other is for any place which has data they want to avoid losing control of: if you can use a thumb drive, you can copy data on to it and take it out of the building where it can potentially become a disaster (intentional or not) — imagine if someone in HR wants to work at home and then drops the key with thousands of personnel records on it and you have to do a breach disclosure for all of them just in case someone malicious finds it.
The easiest answer in both cases is to block USB mass storage devices so you can allow things like keyboards and microphones but not storage. That still offers some attacks — a famous old one was https://lcamtuf.coredump.cx/plasma_globe/ — so places might go even further. It's been a while but a couple decades back when I was at a local security meetup with some people from the Navy SPAWAR facility, they said their protection system was a tube of epoxy: it was cheaper to pay someone to chisel it off while someone else watched a few times a year to replace broken keyboard or mouse than it was trying to figure out all of the possible ways someone could exploit something like USB, Firewire, etc. That's an extreme case but it is worth remembering that if you have any real cost to losing control of your computers or data it might be cheaper to limit how people can connect to the computers holding that data. I know people work in regulated industries who have certain things they can only do on locked-down terminal servers for the same reason — there's an upper bound to how quickly you could exfiltrate data if someone has to OCR a remote desktop session while they hold down the Page Down key.
Apple is not done.Sigh. Late to the party still. Google's making a dogs breakfast of it, which in no way surprises anyone, but they've got working stuff out there. Apple is across the board done. Microsoft rides on Google's coat tails (though to be fair, they do the Windows Hello part, that Google needs for it on Windows).
Any wonder I hate testing FIDO2 on Firefox (especially on Linux)
The account you are responding to seems to (possibly purposely) misunderstand that Google is somehow in the loop of using a passkey to login to another site. The words “Google passkey” in succession in a headline seems to have scrambled some brains to think this is a service provided by them making people dependent on Google’s good will or whatnot.
I’m half seriously starting to think some of the hysteria being enflamed here is from bot farms run by criminals protecting their business.
You don’t even understand how passkeys are a strong mitigation against phishing and MITM attacks? Then why are you filling the comments with misinformation when you haven’t done basic research? This was all explained clearly in the articles you have been very vocal in the comments.
Also, you said earlier that passwords are rarely compromised at point of use and that credential compromises are mostly from dictionary attacks, credential stuffing and exposed unsecured password databases. Now you’re saying that actually there are phishing attacks that are successful even with TOTP, and the NCSC and CISA both state that phishing is still the prevalent attack vector, so I still say that you were wrong earlier and that passwords are still vulnerable at the point of use.
Nation states definitely do target tech support pretending to be employees to reset devices/MFA. So no idea what you're going on about here.Nation states are not going to target the tech support of an online service like Google which includes end to end encryption and which notifies its users if it suspects a hostile intrusion attempt. That would be the worst thing they could do. They would get an encrypted blob of data at best, and risk that the target would likely be alerted and seek security advice.
Was fully aware you were being sarcastic. I was responding sardonically as nobody was showing the the plan to remove passwords (until page 14).I’m glad that you like my suggested roadmap but I was being sarcastic; what I suggested is actually happening now and what is planned for the future, as documented in this article…. But don’t waste your time waiting for meaningful whitepapers, for decades now they have been another term for ‘marketing fluff to send to the accountants and upper management’ and the target audience is the IT people who know just enough to be dangerous