The passkey ecosystem is far from complete, but Google's implementation is now ready to use.
See full article...
See full article...
If you're traveling and need guaranteed access to a 2FA protected account then bring the codes with you. They can be changed when you get home if you're worried about it. If you're worried an adversary is going to be able to target you specifically and get those codes and your (strong, unique) password simultaneously, well then there's probably not really anything you can do.Talk about overlooking. "Somewhere safe" means "somewhere only I can get to after authenticating". This is like saying that I need to keep the spare key to my safe in my safe.
Also, how is the hard copy going to help when I'm abroad and can't get to it?
Nothing prevents that. This is before the session cookie is even created stuff.So does this protect against malware grabbing browser cookie info on devices once logged in? If I logged in this way today on chrome on a windows PC, does it auto log-in tomorrow without the passkey being re-input, which would create this security risk? Or does it require logging in every time, more secure but probably not favored for usability by less security aware users?
1Password, Bitwarden, and other password managers are working on support and will probably be released later this year based on what they've signalled. Do you use these services, or another password manager? Then in theory it will be just as easy once that capability rolls out.Ars, what I never see addressed in these articles are mixed use and multi use devices.
I use an Android phone. I use chrome I have office 365 on my phone for business and only business. How can I authenticate just business without giving up personal info. Or the other direction
At work I use three browsers. Firefox if I look something up personally, chrome for our erp system, and edge for work related web lookups each one gets different logins and stores different logins.
If you sign into a single ecosystem these systems work okay. Until they get canceled
Bringing those codes with you as you travel does NOT sound like a safe place to keep them.If you're traveling and need guaranteed access to a 2FA protected account then bring the codes with you. They can be changed when you get home if you're worried about it. If you're worried an adversary is going to be able to target you specifically and get those codes and your (strong, unique) password simultaneously, well then there's probably not really anything you can do.
Your other alternatives are to bring a device that doesn't need 2FA and leave it in your hotel (and if your adversary is so sophisticated that they are targeting your hard copy codes and have one password already then that's not going to work!) or disable 2FA which is, obviously, worse.
What's the basis for saying the cross-platform support doesn't work? Can you describe where things break down and maybe provide a screenshot or two to illustrate? Also, when is the last time you tried the cross-platform mechanism? As you can see from the 2019 article I posted and linked to in today's post, I too once had criticisms. Since then, things have changed considerably under the hood. For instance (and as also noted in today's post) the Bluetooth communications have been stripped to the bare essentials. That makes it much easier for your devices to connect.No, it's cross platform support is trash and that doesn't really work. So, wake me up when they get it right, I'll keep using these yubikeys.
Apple currently requires 2FA just to log in as far as I’m aware, and just the iCloud login is not enough to iCloud Keychain sync - it either gets approved from another device (I think), or you use the device unlock code from a device that did or does have access. So if your iPhone catches fire, you can still use its old unlock code to get into keychain.Doesn’t that make passkeys kind of useless? I mean, now you have a non-passkey attack vector.
It’s a matter of perspective. Security experts worry about a third party getting into their stuff. Non-security experts worry about accidentally irreversibly encrypting all of the family photos.
It's a shame this post is so highly upvoted, because it's based on a fundamental misunderstanding. You need to have your phone to scan the QR code exactly once when logging in from a new device. After that you won't be "having to go find your phone. As for having to "go thru some setup for fingerprints," anyone who has set up Face ID or fingerprint scanning on their Mac, iPhone, Android device, or Windows computer has already done this. And if your device doesn't support fingerprint or face ID, you can always simply enter the unlock PIN.I'm not sure having to go find your phone, find the app to scan the QR code with, I guess you'd have had to go thru some setup for fingerprints...and hope it accepts your fingerprint (I have issues with fingerprint unlock on the devices I've tried it, such as after working in the yard or on the car it won't accept until my skin heals fully for several days).
That doesn't fit what I would call "easy"
Bringing those codes with you as you travel does NOT sound like a safe place to keep them.
Also keeping a second (non 2FA) device isn’t going to help. Either the stuff I need is not going to be on that device, or it is, which means it is kept insecurely since you don’t need 2FA to get to it.
If my 2FA account is also accessible via a password, then it might as well not be 2FA because it has a way easier attack vector in the password.
This is why everyone has issues with all these articles. Some claim bluetooth is required for proximity verification, others say it isn't. The "official" documentation is severely lacking, the password manager documentation doesn't actually state one way or the other. This seems like an incomplete integration.
From the article:
"Some passkey skeptics have expressed concerns about entrusting Apple, Google, or Microsoft infrastructure with the secret key. Some of these critics have gone so far as to say that passkeys are a power play designed to give these companies control of authentication secrets not previously possible. These claims simply aren’t true."
For me at least, this is a mischaracterization of the concern. There are horror stories for example (reported here on ARS) of Google disabling a man's account for sharing photos of his child with his doctor. If all of my passkeys are tied up in Google's ecosystem and something like that happens, I'm totally screwed and would be unable to work.
The solution is simple enough though: don't trust a hardware vendor, instead only store passkeys in something cross-platform and open source like Bitwarden. For me, that is the only way that I am going to start using passkeys.
Edit to add:
Yes I am aware that Bitwarden does not have full passkey support today. It is in the works:
View: https://www.reddit.com/r/Bitwarden/comments/136j90t/did_you_know_bitwarden_is_working_on_passkey/
So you don't use Windows, iOS or macOS, just Android and Linux?Passkeys are cool and fine. But no, I will not be using one from google, et al. I'll take something that is fully open source and lets me maintain independent backups of my keys, thank you very much.
Why would they need to compromise the codes and your password? If you can access the account using a password, they can just compromise the password, right? Or do I misunderstand what you mean?Realistically, the threat profile of someone physically compromising the codes AND my password simultaneously (all in the window before I get home and change them) is pretty miniscule, and I'd challenge you to explain how it isn't.
But, if the threat is too great for you that's fine, then you can not guarantee access to any 2FA protected account while traveling and your concerns about losing your phone down a well don't just apply to passkey but every account that is protected.
I don't understand your reasoning. Under today's password paradigm, Google can suspend your account anytime it wants. How does using passkeys make it easier for Google?
Also Google passkeys ARE ALREADY cross platform. My Google passkeys are currently being synced not just by Google, but also through the iCloud Keychain and Windows Hello. As you note, Bitwarden, 1Password and a bunch of other third parties will soon also provide syncing.
What's your basis for implying Google passkeys aren't already cross platform?
Are you talking about storing your passkeys in Google's ecosystem, or using a passkey to secure your Google account?... the answer is in the question: Google.
Why would I trust an organization which is a multiple privacy violations relapser, and who, by law, must provide my data to US authorities whenever they feel like it?
Ars alone has published 5 Passkeys are killing passwords articles in 7 months. Three of which are in the last week. That's not just covering new tech stuff, that's pushing a narrative. Look at the non-tech sites saying "Google and Apple are killing passwords!" It's been going on for the last 1-2 months pretty constantly on the same websites.I think it's simpler.
Big tech wants to kill passwords because it is a significant cost. Compromised accounts represent a major customer service issue. It stops people using their services, it makes people lose their important and often highly personal data, and it's expensive and time consuming to fix. It's why Google, Facebook, etc. are so keen on pushing 2FA and want to make it as close to mandatory as possible. Current 2FA significantly reduces these security issues - but it also comes with a host of UX problems and compromises. In the long run, passkeys eliminate a lot of those drawbacks while also providing a better UX.
Remember that we've been using passwords since basically the dawn of computing - yet we still routinely see major mistakes made in their implementation, even boneheaded stuff like companies storing them in unsecured plaintext databases. But even then, it was a couple of decades until we had really got a lot of the issues sorted out, and truly good password managers emerged. Passkeys are going to take some time to sort out the issues as well.
Also, come on, the accusations of astroturfing are just a little bit ridiculous. You do know how tech news coverage works right? Why is a tech news site covering a new technology suspect? Isn't that why you're here?
If I do have an issue with the reporting around passkeys, it's the suggestion that they are now ready for primetime. I think they're neat and possibly worth using for the types of people who are inclined to read tech news about login security... but average users, today, not so much. At the same time, they also won't get there if people don't know they exist, so there's definitely benefit in getting the word out.
How is this multistep process easier than filling in a password?
So then, Dan, how about an article showcasing those options?There are many more options for using passkeys than critics commenting here realize.
I think pushing people to use passkeys without a detailed understanding of exactly how they are better to use than passwords, along with pushing while the environment is still being developed, gets you exactly the kind of pushback you're seeing in this thread.Many of the criticisms so far are based on fundamental misunderstandings about passkeys. Going forward in comments, please don't criticize if you haven't tried it first.
Yeah, fair enough. I get that this won't work for everyone. And I'm not even in a hurry to jump on it; I'll wait to see more support from vendors other than Google.My phone is...usually somewhere in the house, though I regularly have to call it from a landline or use the "find my phone" to play a noise to find it probably once a week or so. And sometimes I am in a hurry and forget it on my way out to work.
And I work in a place that doesn't allow personal electronics so I have to use the company-issued devices when I'm at work and the personal phone stays in the car or a locker all day. Which is partly why I don't miss it THAT much if I forget it at home. Slightly more annoying if you forget it in the locker at the office and don't realize until you get back home without it.
Though that still doesn't solve how often fingerprint unlock fails across multiple devices of multiple brands, and I mostly ignore it now because the pin is faster and more reliable to type.
It's a shame this post is so highly upvoted, because it's based on a fundamental misunderstanding. You need to have your phone to scan the QR code exactly once when logging in from a new device. After that you won't be "having to go find your phone. As for having to "go thru some setup for fingerprints," anyone who has set up Face ID or fingerprint scanning on their Mac, iPhone, Android device, or Windows computer has already done this. And if your device doesn't support fingerprint or face ID, you can always simply enter the unlock PIN.
tl;dr: despite all the upvotes, this comment is misinformed.
Having had a google account arbitrarily suspended, then having to deal with google's support to try and figure out why ... there is no way I am putting all of my authentication eggs into google's basket.
Exactly.So then, Dan, how about an article showcasing those options?
I think pushing people to use passkeys without a detailed understanding of exactly how they are better to use than passwords, along with pushing while the environment is still being developed, gets you exactly the kind of pushback you're seeing in this thread.
Fair enough. I just updated to the post to add:Edit: Also, for a primer this document is kinda missing a simple explanation of what passkeys actually are and how they operate!
Passkeys are built on the WebAuthentication (or "WebAuthn") standard, which uses public key cryptography. During account registration, the operating system creates a unique cryptographic key pair to associate with an account for the app or website. These keys are generated by the device, securely and uniquely, for every account.
One of these keys is public, and is stored on the server. This public key is not a secret. The other key is private, and is what is needed to actually sign in. The server never learns what the private key is. On Apple devices with Touch ID or Face ID available, they can be used to authorize use of the passkey, which then authenticates the user to the app or website. No shared secret is transmitted, and the server does not need to protect the public key. This makes passkeys very strong, easy to use credentials that are highly phishing-resistant. And platform vendors have worked together within the FIDO Alliance to make sure that passkey implementations are compatible cross-platform and can work on as many devices as possible.
I only see two articles from Ars in the past week (one was the same story renamed, but shows up twice in the search results).Ars alone has published 5 Passkeys are killing passwords articles in 7 months. Three of which are in the last week. That's not just covering new tech stuff, that's pushing a narrative. Look at the non-tech sites saying "Google and Apple are killing passwords!" It's been going on for the last 1-2 months pretty constantly on the same websites.
Not only that but every single article lacks actually talking about the tech aspects -- which is easily seen by the fact that nobody actually can point to a diagram and say for sure "yup this is how it works". Bluetooth required? Yes? No? Who knows. Even you say it yourself that they are all saying it's ready for primetime.
If it's not ready for primetime, why are sites like ars pushing it like it is? Why is it on this perpetual news cycle with nothing new about it. There isn't any new details about it yet here we are, talking about it again.
Also Google passkeys ARE ALREADY cross platform. My Google passkeys are currently being synced not just by Google, but also through the iCloud Keychain and Windows Hello. As you note, Bitwarden, 1Password and a bunch of other third parties will soon also provide syncing.
Oh, I am fully aware that I have soft, child-like hands from a career as a software developer. I was just trying to point out that for some people, fingerprint unlock isn't an issue. The examples I gave were the worst case scenarios that I encounter.Maybe not for you but my fingertips also regularly wear out from hand work, even when I wear gloves as much as possible. It’s basically inevitable.
Sorry but your flex of “my fingers are more scuffed than yours” is silly
Can you explain how passkeys make it easier from Microsoft et al. to "nuke your account"? Even if these companies could delete the passkey from your device, what exactly would stop you from simply logging in with your password the way you always used to?Why limit your (dis-)trust to a hardware vendor? Do you have any reason to believe Microsoft won't nuke your account without clear cause or form of recourse? Sorry for the Google translate-link: horrorstory
I agree with your roll-your-own open source route, without dependencies on external parties.
Nope. There are other ways to access your account. Yubi keys are just one example.I imagine all the desktop Windows computers used in businesses and government would need a whole lot of Bluetooth dongles to implement this.
If the overide is a password it is not an improvement for the rest either.Exactly. This only benefits the 99.9% of the population that doesn't follow good password practices. For the rest of us, it is just a hassle.