| ▲ | mi_lk 4 hours ago | ||||||||||||||||||||||||||||||||||
is it fair to say all passkey implementations have this advantage while only some password implementations can match? | |||||||||||||||||||||||||||||||||||
| ▲ | simoncion 3 hours ago | parent [-] | ||||||||||||||||||||||||||||||||||
It is absolutely unfair to say it. Just like passwords stored in a password manager, passkeys can be copied out of the device for safekeeping. Because you can copy them out, a user can be induced to give them to someone. I saw passkey boosters go very, very rapidly from "Passkeys are immune to phishing!" to "Passkeys are phishing resistant!" when lots of real-world people started using passkeys and demonstrated that you absolutely must have a way to back them up and move them around. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||