▲ | anonymars 9 days ago | |||||||||||||||||||||||||||||||
Strawman? We are talking about this link, right, the one that says: > I've already heard rumblings that KeepassXC is likely to be featured in a few industry presentations that highlight security challenges with passkey providers, the need for functional and security certification, and the lack of identifying passkey provider attestation (which would allow RPs to block you, and something that I have previously rallied against but rethinking as of late because of these situations). > The reason we're having a conversation about providers being blocked is because the FIDO Alliance is considering extending attestation to cover roaming keys. > From this conversation it sounds like the FIDO Alliance is leaning towards making it possible for services to block roaming keys from specific providers. | ||||||||||||||||||||||||||||||||
▲ | eddythompson80 9 days ago | parent [-] | |||||||||||||||||||||||||||||||
Yes, read the quotes you took again. Attestation is not a thing currently. There is legitimate discussion about how to handle shitty password managers. If LastPass shits the bed again, it would be great to have a mechanism for others to block it or at least know that due to a major incident, keys from that tool are week. Debian OpenSSL keys were vulnerable for a long time and being able to know and alert or block private keys generated on a Debian machine is reasonable if not desirable. If KeepassXC is insecure or promote insecure practices who's fault is that and what do you suggest we do? The entire issue is about doing the minimum possible of not exporting it in plaintext. Nothing is stopping you from decrypting it and posting it on your Twitter if you so wish. Just don't have the password manager encourage bad practices. How it that unreasonable? | ||||||||||||||||||||||||||||||||
|