this post was submitted on 02 Nov 2023
107 points (99.1% liked)

Technology

59390 readers
3596 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Passkey support arrived in KeePassXC https://github.com/keepassxreboot/keepassxc/issues/1870

Just last week so it's not in any distributions yet, but a binary can be found here: https://snapshot.keepassxc.org/build-235575/

I haven't tried it yet because I haven't been using passkeys because it wasn't implemented in KeePassXC but now that it is I will try on some page which implements it. Just need to figure out who implements it. I think none of the Fediverse services does yet.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 27 points 1 year ago* (last edited 1 year ago) (16 children)

Instead of having a secret that both you and the server share (password). Only you have the secret. Basically, what happens is that the server sends a message to your device encrypted that says, "If you are person, please give me back this code unencrypted." And then it gives a code, for example. Your device decrypts that using your secret that you keep and then tells the server the code and the only way to have gotten that code is for you to have successfully decrypted the message the server sent.

By doing it this way, if the server is ever compromised, then it contains no secrets for your account to be brute force decrypted by a hacker.

[–] [email protected] 2 points 1 year ago (8 children)

how does the server encrypt the message it sends without the secret? Or is that stored during sign up?

[–] [email protected] 6 points 1 year ago (7 children)

When you sign up, your device creates a public private key pair. It keeps the private key locally and sends the public key to the server. So instead of a username, you are nothing but a string of random characters representing your public key. You can see an example of this, if you go into the Linux terminal and type "ssh-keygen"

[–] [email protected] 1 points 1 year ago

good explanation, thank you! I'm very familiar with ssh key auth so that makes sense

load more comments (6 replies)
load more comments (6 replies)
load more comments (13 replies)