| ▲ | akersten 8 hours ago |
| > Don't use passkeys Better title. Mom can't figure out what they are or how to use them. They bind you to your device/iCloud/Gaia account so if it gets stolen/banned you're out of luck (yeah yeah multiple devices and paths to auth and backup codes, none of that matters). It's one further step down the attested hardware software and eyeballs path. Passwords forever, shortcomings be damned. |
|
| ▲ | Someone1234 8 hours ago | parent | next [-] |
| Unfortunately some vendors are now REQUIRING passkeys; specific example: https://www.healthequity.com > As of October 2025, passkey login has been fully rolled out and is now required for members with Health Savings Accounts (HSAs) and Reimbursement Accounts (RAs) who use the HealthEquity Mobile app and web experience. https://help.healthequity.com/en/articles/11690915-passkey-f... The FAQ is a little misleading by saying WHEN your account has a passkey this and that, but reality is that after October they made them completely mandatory, no bypass, no exceptions. 100% coverage. Oh, and by the way, passkeys have been broken on PC/Linux when using Firefox for months: > There Was A Problem: We encountered an error contacting the login service. Please try again in a few minutes. Neat. You have to use Chrome or Edge.... For months, after making it mandatory... |
| |
| ▲ | buzer 6 hours ago | parent | next [-] | | That's weird, I can login to my HealthEquity account (which contains HSA) without any issues and I don't have passkey setup. I confirmed it just now just in case. That article does say "HealthEquity Mobile and web experience" so maybe it's just for customers who use both, I only use web. | | | |
| ▲ | cyanydeez 3 hours ago | parent | prev [-] | | side note, HSAs are also a symptom of a failed Healthcare system | | |
| ▲ | Someone1234 12 minutes ago | parent [-] | | You aren't wrong, but many of us are stuck in that failed healthcare system and making the best of it. |
|
|
|
| ▲ | jesseendahl 6 hours ago | parent | prev | next [-] |
| >They bind you to your device/iCloud/Gaia account so if it gets stolen/banned you're out of luck This is the biggest myth/misconception I see repeated about passkeys all the time. It's a credential just like your password. If you forget it, you go through a reset flow where a link is sent to your email and you just setup a new one. And if it happens to be your Gmail account that you're locked out of, you need to go through the same Google Account Recovery flow regardless of whether you're using a password or a passkey. |
| |
| ▲ | pibaker 4 hours ago | parent | next [-] | | First, in relation to TFA: even if you regain access through a recovery channel, any data that was encrypted using your lost passkey will now be gone. There are also many exciting new ways you can lose your passkey that wasn't the case with a password you can remember in your mind. The person you responded to is worrying about big tech randomly banning you and making you lose access, in the meanwhile I'm mostly worried about losing the physical device containing the key. I don't think I will forget, say, my Google password unless I got Alzheimers or got hit in the head by a hammer, at which point I will have bigger problems than a lost Google account. And let's not pretend account recovery process is always smooth and easy. They may require evidence from your other accounts you cannot access now due to the key loss. They may demand government IDs that might have been lost alongside your device. They may also just deem your recovery attempt fraudulent and ban you for no reason (which I similar to the scenario the post you are replying to desctibed.) | |
| ▲ | mcdeltat 5 hours ago | parent | prev [-] | | Genuine question: what if the recovery asks for a 2nd factor that's e.g. the device which you lost? Is that common? Personally I don't really trust companies to not do a whoopsie and permanently lock you out when you lose credentials. Especially when the company is big or hard to access in person. For someone like me who already uses a password manager for everything, passkeys seem to add no security while reducing usability and control. | | |
| ▲ | realityking 5 hours ago | parent | next [-] | | > For someone like me who already uses a password manager for everything, passkeys seem to add no security while reducing usability and control. One advantage of passkeys is that they’re phishing resistant. They’re bound to the website that you created them for, it’s impossible to use them for a different website. | |
| ▲ | NekkoDroid 2 hours ago | parent | prev [-] | | > Genuine question: what if the recovery asks for a 2nd factor that's e.g. the device which you lost? Is that common? Instagram does something similar. If you have no logged in device and you reset your password, good luck getting in, cuz it wants you to log in a device "it recognizes" else it won't let you log in. |
|
|
|
| ▲ | mgrandl 7 hours ago | parent | prev | next [-] |
| I love passkeys in my selfhosted vaultwarden, but I agree the UX for older people is not quite there. |
| |
| ▲ | jesseendahl 6 hours ago | parent [-] | | Passwords are terrible UX for old people in my experience. They try use the same password everywhere, but then password complexity requirements mean they can't use the exact same password everywhere, and then they forget which variant they used on which service, so they just end up going through the reset password flow every time they sign in. I am not convinced that's a better UX than them just using their fingerprint or face to login. |
|
|
| ▲ | utopiah 6 hours ago | parent | prev | next [-] |
| > They bind you to your device Isn't it why good practice is to bind at least 2 hardware passkeys and/or have recovery codes? Sure someone can steal your phone/laptop/yubikeybio but then you can use the NitroKey you have at home in your drawer to recover your account. |
| |
| ▲ | pibaker 6 hours ago | parent | next [-] | | Biometric keys are still a niche techie thing that the average person probably doesn't even know exist. Most people will be using passkeys exclusively through their phones, often unintentionally. And outside the first world it is not uncommon for people do own no computing devices apart from their phones. Backup keys and recovery codes also do not solve all cases of key loss. One thing I worry about is what happens if I am traveling in a foreign country and loses my belongings. In the past if I can convince someone to let me use his computer I can at least log into my email account as long as I remember my password. If everything is passkey then I will be locked out of all my online accounts until I make it back home, assuming that I have actually properly set up the backup device and keys. Humans are not very good at making sure that backups actually work. | | |
| ▲ | tuwtuwtuwtuw 3 hours ago | parent [-] | | Your email account would hopefully have 2FA enabled, so if you lose your belongings, then how would you log on in your scenario? Assuming your 2FA tokens are generated by phone, of course. But I think that's by far the most common way. |
| |
| ▲ | aeronaut80 6 hours ago | parent | prev [-] | | You can’t expect your grandma to go to those lengths. Heck, even most internet-native people probably wouldn’t. | | |
| ▲ | utopiah 6 hours ago | parent [-] | | For a random website, no, for bank and primary email (used for account recovery), they probably should. It honestly takes a minute to add a key and it's just that, a physical key. IMHO what's risky in terms of UX and habits is precisely that most workflows do not highlight this. So people rightfully are scared of losing that 1 precious key, so they don't activate 2FA because of that. Meanwhile if the UX when they activate 2FA would clarify that they only have 1 key stored, adding a 2nd one or saving codes (most do propose that option for 2FA authenticators but not hardware passkey AFAIK) is what will make them both safe against attacked but also against their own accident (shit happens) then maybe behaviors would change. Anyway, yes, you're right, most people don't do that or aren't even aware of it but arguably as more and more important and intimate part of our lives are online, it becomes crucial for one owns sanity to better understand how this all works. | | |
| ▲ | Telaneo an hour ago | parent [-] | | > For a random website, no, for bank and primary email (used for account recovery), they probably should. Even for this, for grandma, this is probably still asking for a lot. Grandma's bank will have a recovery option even if she's tossed her phone, computer and hardware token in the ocean, and then had a stroke which made her forget any passphrases or whatever: You can call the bank and physically authenticate yourself with a passport, driver's licence or some other ID. It's a bitch to do, you may have to go to an actual bank branch, but grandma will get access to her money again. Meanwhile, her access to physical mail doesn't stop just because she's forgotten some passphrase or lost her phone. Even techy people get caught out by Google forcing 2FA, while casuals don't even consider the possibility of losing access to their email. While both the rhetorical you and grandma both should probably have a bulletproof recovery option for their email, since it will be the foundation of their digital identity, getting them to acknowledge the problem is going to be hard, and the solution, paying for a Yubikey or some other house of cards solution, is a tough sell. |
|
|
|
|
| ▲ | reddalo 4 hours ago | parent | prev | next [-] |
| I'm also completely against passkeys. A safe password and a good password manager are way better, they don't lock you into any platform. It's super sad to see all kinds of websites offering you to add a passkey when you log in. |
| |
| ▲ | lxgr 3 hours ago | parent | next [-] | | > A safe password and a good password manager are way better, they don't lock you into any platform. An open, cross-platform passkey implementation does all that too, and on top of that prevents you from accidental password leaks via logs, MITM etc. by default. > It's super sad to see all kinds of websites offering you to add a passkey when you log in. As long as they're not forcing you to add one, what exactly is your problem with having more choice? Personally, I am grateful for every site that doesn't require my phone number to sign up and uses passkeys for authentication instead, yet I also don't want SMS authentication banned for everybody since I understand it currently works better than Passkeys for many people. | |
| ▲ | dariosalvi78 3 hours ago | parent | prev | next [-] | | passkeys are a great idea, but poorly implemented | |
| ▲ | tuwtuwtuwtuw 4 hours ago | parent | prev [-] | | I was planning to make use of passkeys when logging on to various services, so I ordered three physical devices, supporting passkeys (yubikey). I ordered USB C and USB A variants, with NFC support. Is this a mistake? I am already using password manager and totp for my accounts, but I am tired of dealing with passwords. Even when using a password manager (bitwarden in my case), it just get tedious bringing out my phone, starting auth app, locating the correct account, reading 6 digit token and logging on. |
|
|
| ▲ | pabs3 8 hours ago | parent | prev | next [-] |
| KeepassXC has exportable passkeys, so you can avoid the stolen case at least. |
| |
| ▲ | 8cvor6j844qw_d6 4 hours ago | parent | next [-] | | > exportable passkeys But didn't the author hint that this could get blocked? My general read on passkeys and their implementers is that exportability is seen as a risky feature, and there's a push to make it as opaque as possible, likely through attestation or similar mechanisms. [1]: https://github.com/keepassxreboot/keepassxc/issues/10407 | |
| ▲ | hollow-moe 4 hours ago | parent | prev [-] | | Too bad the spec is stupid and requires password managers to be identifiable so servers can deny the "insecure ones".
It's already a pain to use Keepassxc for otp since they all want you to use their apps but it's still doable (the worst offender being steam where you have to hack your own app to extract the otp secret). With passkeys you won't have a choice to use The Google AuthenticatorTM etc because eventually some exec will find they can block every provider except their own to boost app download KPI.
I really like concept of passkeys, the simple fact of using asymmetric keys is so much better than giving the secret to prove you have it, but the spec is hostile and thought for vendor closing. | | |
| ▲ | pabs3 an hour ago | parent [-] | | IIRC KeepassXC can just identify as Apple Passkeys and it will work fine. |
|
|
|
| ▲ | afiori 7 hours ago | parent | prev | next [-] |
| Also a password could be the passkey, the passkey protocol is basically a way to send to a server an authenticated public key. The client could deterministically convert passwords to key-pairs and authenticate with those |
|
| ▲ | lxgr 3 hours ago | parent | prev [-] |
| > They bind you to your device/iCloud/Gaia account Then don't use Apple's/Google's/whatever Gaia is as your passkey provider? > Mom can't figure out what they are or how to use them. Then do something nice for your mom and set her up with Bitwarden, 1Password or KeepassXC, which prevents the platform lock-in. > It's one further step down the attested hardware software and eyeballs path. None of the synchronized passkey implementations, which big tech has been pushing lately, support attestation, so this is just FUD. Yubikeys do, but fortunately they don't seem to have the (non-enterprise) weight to make it mandatory for all passkeys. |