▲ | politelemon 5 days ago | |||||||||||||||||||||||||||||||||||||
> Passkeys, particularly when bound to a physical security key And _only_ when bound to a physical security key. Unfortunately by tying into the marketing of passkeys, there is going to be a pervasive assumption that ecosystem/on-device passkeys are just as secure. Overall a good set of points, and I think it highlights the issues with a lot of the lauded 'convenience' factors in the Apple ecosystem. | ||||||||||||||||||||||||||||||||||||||
▲ | Shank 5 days ago | parent [-] | |||||||||||||||||||||||||||||||||||||
> Unfortunately by tying into the marketing of passkeys, there is going to be a pervasive assumption that ecosystem/on-device passkeys are just as secure. Passkeys are an improvement over passwords. Security keys have a place for high security applications like enterprise deployments or the security paranoid. Passkeys stored on security keys can be trivially made worse by allowing users to set bad PINs (like 0000). If you use an iPhone and iCloud Keychain, iOS won’t permit you to store or use Passkeys with such an obvious passcode, but a Yubikey 5 will. | ||||||||||||||||||||||||||||||||||||||
|