Most active commenters
  • (3)

←back to thread

225 points Terretta | 22 comments | | HN request time: 0.646s | source | bottom
1. rkagerer ◴[] No.41856151[source]
Does this include a way for a technically-savvy user to 'repatriate' their passkeys into their own infrastructure? (i.e. If I want to be my own provider)
replies(5): >>41856235 #>>41856260 #>>41856382 #>>41856674 #>>41864441 #
2. commandersaki ◴[] No.41856235[source]
At a minimum we will see if KeePass is a provider that is supported; they seem to be the only pw manager in town that respect user freedom.
replies(2): >>41864046 #>>41869178 #
3. ratorx ◴[] No.41856260[source]
Can you not just set up a new passkey using a different provider (eg. Bitwarden)? It is a bit inconvenient, since it has to be done manually for every site.
replies(2): >>41856348 #>>41856725 #
4. whatevaa ◴[] No.41856348[source]
A bit is understatement. If this passkeys become widespread, we are talking about like 100 sites.
replies(1): >>41863466 #
5. HeatrayEnjoyer ◴[] No.41856382[source]
There shouldn't be. Secure enclaves aren't secure if they can be copied
replies(7): >>41856651 #>>41863070 #>>41863950 #>>41864073 #>>41867442 #>>41867586 #>>41871611 #
6. lucianbr ◴[] No.41856651[source]
How does this suddenly become a problem when as the user I want access to my keys, but it isn't a problem when corporations copy my keys between them, which is what this post is about?
replies(1): >>41863813 #
7. Terr_ ◴[] No.41856674[source]
I would also be concerned about whether you can recover when a provider becomes unusable or hostile, and there is no cooperative migration path.

That might be the company going bankrupt, a physical or digital disaster, geopolitical firewalls, or simply a Kafka-esque bureaucracy where your entire account has been deleted without appeal because the company decided it was easier than figuring out the truth behind some moderation issue.

8. Jnr ◴[] No.41856725[source]
If you go for passkeys, start putting them in your own provider from the start? Vaultwarden is a nice option.
9. jasonjayr ◴[] No.41863070[source]
Secured against who?
10. ensignavenger ◴[] No.41863466{3}[source]
I have over 500 logins in my Bitwarden account right now. Many of those are not important in the least, but hundreds of them are.
11. ◴[] No.41863813{3}[source]
12. eikenberry ◴[] No.41863950[source]
So you are against this new spec becoming a standard then?
13. lovethevoid ◴[] No.41864046[source]
KeepassXC already supports passkeys
14. benlivengood ◴[] No.41864073[source]
The exchange spec suggests that the sending secure enclave sends encrypted credentials to the receiving secure enclave; they're never unwrapped in public between 'trusting' enclaves; which enclaves will trust each other enough to perform the credential transfer is another question.
15. EasyMark ◴[] No.41864441[source]
That seems scary, I think I’d rather move them over one by one and delete the old passkey/2fa. I want to make it as hard as possible to keep them from being moveable as that’s one less attack point for hackers.
replies(1): >>41871597 #
16. noirscape ◴[] No.41867442[source]
In that case, the keys would be a non-starter. The overwhelming majority of tech requests relate to people forgetting their passwords and getting in trouble because the browser's password manager forgot the password itself.

The reality is that the biggest pushers of Passkeys are the providers with the least amount of infrastructure stability. If you want people to get to use Passkeys, providing an exit tool from Google and Apple is a must, because both providers are godawful at not accidentally mushing up your data. That's not so important if all you're using their infrastructure for is a periodic backup/use it to transfer photos to your PC, but it's a problem for anything that has to be stored long-term.

replies(1): >>41878714 #
17. lxgr ◴[] No.41867586[source]
Passkeys and secure enclaves are only loosely related. You can implement one using the other, but it’s by no means a requirement.

And even when they are, nothing says that secure enclaves can’t have importable or exportable keys. Many schemes do both on a regular basis.

18. rprospero ◴[] No.41869178[source]
I'm curious if you count Pass (https://www.passwordstore.org/) as not being "in town" or if it has issues with user freedom that I'm ignorant of.
replies(1): >>41875562 #
19. ◴[] No.41871597[source]
20. ◴[] No.41871611[source]
21. commandersaki ◴[] No.41875562{3}[source]
Eh I should’ve qualified with pw managers that support passkeys.
22. HeatrayEnjoyer ◴[] No.41878714{3}[source]
Any exit tool just becomes the latest focus of phishers and credential stealing malware.