Remix.run Logo
raphinou 9 days ago

Honest question: isn't that introducing some weaknesses, allowing the attacker to either reactivate password auth or add it's own passkey eh by tricking the user in accepting that change after receiving a mail with a link to accept that change? That would make the passkey unbreakable, but leave other easier to exploit weaknesses.

izacus 9 days ago | parent [-]

No. You always need that flow.