this post was submitted on 15 Oct 2024
188 points (92.0% liked)
Technology
59347 readers
5626 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I still have no idea how to use passkeys. It doesn't seem obvious to the average user.
I tried adding a passkey to an account, and all it does is cause a Firefox notification that says "touch your security key to continue with [website URL]". It is not clear what to do next.
I think you actually have to buy a passkey device. Then configure it to work with a particular account.
You plug the passkey into your computer and then whenever it asks for a password you literally touch it and it does its thing. I think there are options like biometrics that you can add on top but you don't have to have that.
Devices themselves can act as passkeys too - I.e. your phone, laptop etc...
...except the ones that can't
I think it depends on whether you have a TPM chip in it
What are you talking about? KeepassXC, to my knowledge, is not dependent on any TPM, snd it does support passkeys.
I didn't say a device needs a TPM to support passkeys - I said I believe it it needs one to be a passkey
Thank you for your passive aggressive response caused by poor reading comprehension, though
From what I understand, "passkey" refers to software, so no such thing as "device being a passkey". Unlike a hardware key.
You understand incorrectly. "passkey" refers to a token used for the public key authentication that is used for sign in, which needs to be stored somewhere - this can be stored in a hardware key like a YubiKey, or in your device's credentials manager. In principle, this could be anywhere, but it needs to be somewhere secure to not be trivial to compromise (eg taking out your HDD and just copying your passkey off it)
In Windows' case, this secure credentials store is the TPM chip, which is why you are not able to use passkeys on Windows devices that have no TPM chip (unless you use another hardware implementation).
Tldr: passkeys are data, not software, and to store the data, you need some form of hardware, which needs to be secure to not be a really bad idea.
If you'd like to do some reading before confidently correcting me further, I'd suggest reading about how passkeys work.
That is exactly what I said though - passkeys are software. They're not confined to hardware modules, so there's no such thing as "device being a passkey".
Thanks for clarifying