The passkey ecosystem is far from complete, but Google's implementation is now ready to use.
See full article...
See full article...
Using a password should not be the answer to something meant to replace passwords.Update: it has been answered!
I'd like to apologize to Dan, but I also want to make him aware that there might be something funky with Ars's CDN or whatever manages serving your articles, because this change didn't show up for me through multiple forced refreshes, closed and new tabs, until about 5 minutes ago. I was very confused by your insistence that you had updated the article when the text never changed!
Support for Workspace will be coming sooner rather than later. It won't be long.Once again, a very handy feature not available to Google Workspace accounts until.
As time moves on, it has become harder and harder for me to find value in Workspace.
Using a password should not be the answer to something meant to replace passwords.
You’re misunderstanding the comment you’re replying to and I think you overlooked the word ‘analogy’.Wouldn't this mean that web sites could lock out anonymous browsing?
My understanding of HTTPS is that it acts on the fly, to secure the data transfer between my browser and the web server. However, a passkey would be uniquely associated with my device, so any gain in security would be (theoretically, at least) offset by a loss in privacy.
Or am I misunderstanding?
You mean all those hacked, cracked and released databases that were acquired by phishing, which this prevents?
Man, it feels like the literal peanut gallery here.
I am saying long-term. If passkeys are to "kill passwords" saying that the way to add non-bluetooth devices as authenticated passkey devices is to "use a password" you are effectively still with the same weakest link - passwords.This is kind of ridiculous. How else would you authenticate to an existing service in order to update your authentication mechanism? Aside from the already-discussed QR-and-bluetooth method. And while the attack surface on the server side isn't necessarily reduced by enabling rather than requiring passkey login, it significantly reduces the attack surface client-side, as you're strictly engaging in a key exchange, enabled by OS-level authentication. And that's a win for everyone.
If you're to the point that you can't trust any of your OS's security features, you might as well just throw your computing devices away and go live on a tropical island or something. At some point some level of trust has to be given to some bit of software.
I don't understand. If you don't trust Google you must not have an account with them, and obviously this post isn't for you. But for readers who do use Google using a passkey to log in vs. a password gives Google no more control than it already has.
You made an accusation that you could not back up…I can, but I know you can work this out yourself. Also I am in no way inclined to help you with this because frankly I really dislike you.
I am saying long-term. If passkeys are to "kill passwords" saying that the way to add non-bluetooth devices as authenticated passkey devices is to "use a password" you are effectively still with the same weakest link - passwords.
This does not reduce client-side attacks, because if you can effectively gain passkey access via a password, then it's the same as a password.
Wait, how does turning on passkeys cause people to "uproot their entire digital process"? Once you save a passkey, you are 100% able to continue logging in with a password exactly as you have done in the past. This comment is a prime example of what I mean about criticisms being based on fundamental misunderstandings.
This is, frankly, atemporal nonsense that ignores the inconvenient fact of the linear flow of time.
IF someone switches to using passkeys to login to a site, THEN, going forward, client-side attacks meant to harvest passwords will be stymied. Your contention rests upon the password in question already being compromised, at which point the account is already compromised. Just because passkeys won't ex post facto remediate compromised passwords doesn't deprive them of any security utility.
you are working under the presumption that if databases can’t be breached then passwords can not be hacked.
Just because people will not store their passwords on the server side does not improve client side security any more than proper hashing and salting of said passwords.
Black and white thinking - for example “Using Google because my phone requires I have a Gmail and trusting Google with the authentication methods for the rest of my life”.Using Google because my phone requires I have a Gmail and trusting Google with the authentication methods for the rest of my life is a completely different question.
I honestly don't know how someone who is supposed to be in the field of security can bring such black and white thinking to this. Trust is not a binary, the principle of least privilege is a foundational principle?
Having had a google account arbitrarily suspended, then having to deal with google's support to try and figure out why ... there is no way I am putting all of my authentication eggs into google's basket.
Then you are suffering a failure of imagination.I don't understand. If you don't trust Google you must not have an account with them, and obviously this post isn't for you. But for readers who do use Google using a passkey to log in vs. a password gives Google no more control than it already has.
lemme see here... I think the string to and from BasP is a good example of where you could have stopped well ahead of #382's '...stop responding to my posts.' There is also the defense of the well above average count of promoted comments or all caps response would fall in that line as well.Can you give an example or two of my comments that were "highly entertaining" and "convey[ed] disturbing lack of temperament"?
It’s not defeatism. This doesn’t improve security if passwords are a fallback. It’s very simple. The strength of authentication is only as good as the weakest link. People that don’t use MFA for password based auth still won’t use MFA for passkey auth. Which means that password fallback is the same as just having a password login. Congrats, we’re back to square one with regular users.This is a level of infosec apocalyptic defeatism with which I'm not willing to engage, sorry.
I caught one instance of me brushing off someone simply asking a question, and I apologized for it. It's possible I did it elsewhere, and if I did I'll apologize for that, too. My impatience came from people asserting complete misinformation with so much conviction and then getting 90+ upvotes. That kind of thing just misleads people wading in to the comments trying to understand stuff.
...
Many of the criticisms so far are based on fundamental misunderstandings about passkeys. Going forward in comments, please don't criticize if you haven't tried it first.
You're bad faith reading and contradicting yourself. Only having to go through this long process doesn't mean a person doesn't have to go through the process. The objection that this is a long, complicated process isn't actually addressed by saying 'you only have to do it once per device per account'.It's a shame this post is so highly upvoted, because it's based on a fundamental misunderstanding. You need to have your phone to scan the QR code exactly once when logging in from a new device
It sounds like you don't understand how asymmetric encryption works. ICloud Keychain syncs the public key. It never sees or touches the private key.
You don't have to trust the big three to use passkeys. By all means, keep using passwords, but please inform yourself before commenting.
So you don't use Windows, iOS or macOS, just Android and Linux?
Had it ever crossed your mind that people making incorrect statements may simply have misunderstood the technology and therefore think that they are correct?
Black and white thinking - for example “Using Google because my phone requires I have a Gmail and trusting Google with the authentication methods for the rest of my life”.
So you have an android phone and you don’t save ANY passwords or 2FA credentials on the device? And if you don’t trust Google surely it’s vastly better to store a passkey than a password on your android device…
How are you managing your credentials for all your online accounts and services if you refuse to save any passwords or 2FA on your android device?? Easily memorised passwords, password re-use, paper notepad etc? Passkeys are significantly more secure than all of those and they are impossible for Google to steal from you.
With the Luddites, the issue wasn't so much the tech as its impact. The Luddites were home-based weavers. Introduction of steam weaving machines operated by children in factories promised to destroy their livelihoods. Think the intro of robots or AI, and how they may enable some employers to fire most of their workers.I remember when Ars was a technology website. Now it seems way too many of its readers are luddites
They were not all acquired by phishing. Phishing is an actual, specific thing, it is not synonymous with "hacking" in general no matter how often someone tries to use it that way.
This does not prevent your password from being compromised. A password can be compromised without you ever using it, if the backend is compromised, and they are all the time. If a password exists on an account, attackers can use it to blow right past the passkey.
The only way this would increase security is if passwords were abolished. But if they were, this system wouldn't work for the many reasons people have already pointed out. It really is like Bitcoin's relationship with actual money--BC only works if real money exists, but real money existing also makes it pointless to jump through all of BC's unnecessary, non-value-adding hoops.
Oxygen is horrible stuff. It's the major cause of fires, for example, and rust.Yubikeys are great. If people could review oxygen on the internet you'd find bad reviews of it.
I’ve pointed out plenty in earlier posts. Dan’s standard response now seems to be “please point out where I said X” and it’s a tiresome game I’m unwilling to play. If you think I’m trolling when both myself and other commenters here have pointed out instances of his poor behaviour many times already, then you’re wrong but I’m not going to spend any more energy to try and convince you.You made an accusation that you could not back up…
‘I claimed that you’re a bad person and I have lots of evidence that you’re a bad person, but when I’m asked to show the evidence I go all quiet suddenly’.
Standard response when concern trolls get called out, everywhere in the internet.
If you're logging in to Google with a password, you are already placing huge trust in Google authentication. Passkeys require no more or less trust than what you already are placing in Google. Google account passkeys aren't "authentication methods for the rest of your life." You can use your password anytime you like, and you can delete the passkey any time you want.Using Google because my phone requires I have a Gmail and trusting Google with the authentication methods for the rest of my life is a completely different question.
With the Luddites, the issue wasn't so much the tech as its impact. The Luddites were home-based weavers. Introduction of steam weaving machines operated by children in factories promised to destroy their livelihoods. Think the intro of robots or AI, and how they may enable some employers to fire most of their workers.
Though here I think the issue is that the tech has not been clearly explained. And maybe can't be, since it's complex, incomplete and seems to be implemented differently in different places. Like all things, it will have pros and cons, and the cons are fully as important as the pros.
Random cat isn’t wrong. If passwords are a backup for passkeys - then passwords are still being stored in a database, which means that the issue that passkeys are to solve (not using passwords) doesn’t improve server side storage of passswords, because it’s still happened. And it doesn’t improve client side because you can still use passwords for the same thing as a passkey.Looking for these backends that are compromised all the time, I’m sure you can provide citations, right?
Or don’t I’ll probably have you on ignore anyway. Less noise to distract from the conversations of the people that know what they are talking about.
That's a mighty bold prediction. Just like ssh will always allow login via password in addition to ssh keys. Oh, wait, the admin can turn that off,No one will ever support passkeys for login in lieu of a password. Support for passkey logins is in addition to passwords. There's a big difference.
If you're logging in to Google with a password, you are already placing huge trust in Google authentication. Passkeys require no more or less trust than what you already are placing in Google. Google account passkeys aren't "authentication methods for the rest of your life." You can use your password anytime you like, and you can delete the passkey any time you want.
Can you help out the Ars management by pointing out all these "blatantly biased" comments made in bad faith. I have decided to challenge the many, many, many inaccurate assertions being made in this thread. And in a halndful of cases, I have done so using the same vehemence used in asserting the misinformation. I keep asking people for examples. So far no one has provided any.
OK, this is the kind of thing I'm talking about. We have been around and around and around this issue of trusting Google with your passkey. Have you read through the comments already? You will find multiple instances explaining why you don't have to trust Google with your passkey. You will find multiple instances explaining that using Google account passkeys places the same level of trust in Google -- neither more nor less -- than you place already when logging in to Google with a passkey.Same here. Even the thought of trusting Google with my Pass_____s scares the crap out me. I'm still needing to set aside some time to decide if I stick with an online PW manager (and I use WebAuth as my 2FA) or switch solely to a self-hosted PW database. But that's a different topic.
That's a mighty bold prediction. Just like ssh will always allow login via password in addition to ssh keys. Oh, wait, the admin can turn that off,for your own protectionto increase security.
How is trusting Google not to fuck up the passkey process, which is an industry standard more of a stretch than trusting Google not to fuck up its own proprietary method for password authentication?Then you are suffering a failure of imagination.
Of course I have a Google account. Several of them, if you count different gmail accounts separately. That doesn't mean I trust Google, only that I trust them a little bit. I also have my own email domain and server.
It's not just about "giving Google more control," it's about trusting them not to fuck up a process they're already making more complicated than necessary. Their history in this regard (including just abandoning projects they lose interest in) is less than admirable. I'm also not forgetting that Google is an advertising company, and that I'm their product, not their customer.