this post was submitted on 11 Oct 2023
290 points (98.7% liked)

Technology

59578 readers
3015 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Passkey is some sort of specific unique key to a device allowing to use a pin on a device instead of the password. But which won't work on another device.

Now I don't know if that key can be stolen or not, or if it's really more secure or not, as people have really unsecure pins.

you are viewing a single comment's thread
view the rest of the comments
[–] Tibert@jlai.lu 4 points 1 year ago (3 children)

Nothing of that?

You don't need to export or know what is the key.

The key is different for each device.

https://youtu.be/6lBixL_qpro?si=wFFQwrfjQBKDHs5B

[–] smileyhead@discuss.tchncs.de 7 points 1 year ago (3 children)

You don't need to export or know what is the key.

But is it possible in the implementation of Android/iOS?

Backups are a thing. With SSH keys I have different key for every device too, but as they are stored in an accessable file (as all computer data should be) they are backed up with the rest of the system.

[–] hedgehog@ttrpg.network 2 points 1 year ago

Keys are stored in the equivalent of iOS’s Secure Enclave (actual name is implementation specific: ARM’s TrustZone, Samsung’s KNOX, Pixel’s Titan M, etc): https://www.howtogeek.com/387934/your-smartphone-has-a-special-security-chip.-heres-how-it-works/

[–] Tibert@jlai.lu 2 points 1 year ago* (last edited 1 year ago) (1 children)

So first, no, all the files should not be accessible : There are special not "files", but keys, like the key used for this method. These keys pose a huge security risk of they are leaked somehow. The key can be something used to encrypt the device/disk, encrypt a connection, and other things associated with encryption.

And because of that security risk, they are often stored in a special chip or simulated chip (like the simulated tpm 2.0 on pc cpu), and not just "stored" so any malware or who knows what can access them just by reading the drive.

Second, the key is never transfered. When you connect to another device, that other device will get another key. Or maybe could it be backed up somehow in case of recovery on another phone? But that would defeat the entire purpose of this.

How Google can do to allow you to connect to another device if the first one is lost, not sure. But it would certainly either ask for a password and a 2fa method.

[–] jarfil@lemmy.world 0 points 1 year ago (1 children)

How Google can do to allow you to connect to another device if the first one is lost, not sure. But it would certainly either ask for a password and a 2fa method.

That's the key question. From what it seems, it would replace a password manager with different passwords for each website, but you give Google control of the master password.

[–] Tibert@jlai.lu 1 points 1 year ago

It is not for the password manager...

It's just to connect to the google account.

It is not a service to connect to other ones without passwords.

[–] AA5B@lemmy.world 1 points 1 year ago (1 children)

I just replaced my iPhone, and the few places I “sign in with Apple” still work in the new phone. Yes, you can back it up and restore to a different device. I assume you can also use it across devices but I haven’t tried that

[–] smileyhead@discuss.tchncs.de 1 points 1 year ago

This is something different to PassKeys. "Sign in with Apple" is Apple telling online service "let him in", while PassKeys is storing your authentication data on your device.

[–] maniel@lemmy.ml 4 points 1 year ago (1 children)

i tested it on another device, it looks like it gets the passkey from the source device (not from cloud), i had to input the original device's unlock pattern for it to work

[–] Tibert@jlai.lu 4 points 1 year ago* (last edited 1 year ago)

And it's expected as you still had that device. And it's not the same key, a new key has been created for that new device. Now if that device cannot be accessed?

[–] PipedLinkBot@feddit.rocks 2 points 1 year ago

Here is an alternative Piped link(s):

https://piped.video/6lBixL_qpro?si=wFFQwrfjQBKDHs5B

Piped is a privacy-respecting open-source alternative frontend to YouTube.

I'm open-source; check me out at GitHub.