Passkeys replacing Passwords

  • Thread starter Thread starter jedishrfu
  • Start date Start date
Click For Summary
Passkeys are emerging as a secure alternative to traditional passwords, driven by major tech companies like Google, Microsoft, and Apple, alongside the FIDO Alliance's efforts to reduce password reliance. They offer seamless integration at the operating system level, enhancing security and user experience. While some users still prefer traditional password management techniques, the shift towards passkeys aims to simplify authentication and bolster cybersecurity. Even systems like Linux, which have long utilized SSH for secure access, can adopt passkey technology. The ongoing transition reflects a broader movement towards a password-less future in digital security.
Messages
15,557
Reaction score
10,306
TL;DR
Passkeys are replacing passwords as a better means of secure signing to web sites.
https://www.wired.com/story/what-is-a-passkey-and-how-to-use-them/

PASSWORDS SUCK. THEY'RE hard to remember, but worse is playing the ever-evolving game of cybersecurity whack-a-mole with your most important accounts. That’s where passkeys come into play. The so-called “war on passwords” has taken off over the past two years, with titans like Google, Microsoft, and Apple pushing for a password-less future that the FIDO Alliance (a consortium made to “help reduce the world’s over-reliance on passwords”) has been trying to realize for over a decade.
...
{/quote]
 
Computer science news on Phys.org
jedishrfu said:
TL;DR Summary: Passkeys are replacing passwords as a better means of secure signing to web sites.

https://www.wired.com/story/what-is-a-passkey-and-how-to-use-them/
I really don’t find my passwords that hard to remember. I use a pattern which can be varied endlessly. I use a little stronger one on my e-mail as that’s where all the passwords to various sites can be reset.

Apropos not much:

Paasword Strength
 
Last edited:
This made me laugh:
Passkeys are broadly integrated at an operating system level. If you’re using an OS that doesn’t natively support passkeys—i.e., Linux—you can still use them.
Linux has been using SSH for decades with that same principle, securing practically all the servers of the internet:
https://en.wikipedia.org/wiki/Secure_Shell#Authentication:_OpenSSH_key_management said:

Authentication: OpenSSH key management​

On Unix-like systems, the list of authorized public keys is typically stored in the home directory of the user that is allowed to log in remotely, in the file ~/.ssh/authorized_keys. This file is respected by SSH only if it is not writable by anything apart from the owner and root. When the public key is present on the remote end and the matching private key is present on the local end, typing in the password is no longer required. However, for additional security the private key itself can be locked with a passphrase.
But GAFAM has to invent some other way to do the same thing.

I still fail to see any serious advantage over the use of a password manager with random passwords.
 
LLMs and AIs have a bad reputation at PF, and I share this opinion. I have seen too much nonsense they produced, and too many "independent researchers" who weren't so independent after all, since they used them. And then there is a simple question: If we had to check their results anyway, why would we use them in the first place? In fact, their use is forbidden by the rules. I tend to interpret the reason for this rule because nobody wants to talk to a machine via PF. Those who want to can...

Similar threads

Replies
10
Views
4K
  • · Replies 12 ·
Replies
12
Views
5K
  • · Replies 4 ·
Replies
4
Views
3K
  • · Replies 29 ·
Replies
29
Views
10K
Replies
5
Views
5K
  • · Replies 22 ·
Replies
22
Views
4K
  • · Replies 13 ·
Replies
13
Views
4K
  • · Replies 2 ·
Replies
2
Views
3K
  • · Replies 13 ·
Replies
13
Views
10K