291
Google will now make passkeys the default for personal accounts
(arstechnica.com)
This is a most excellent place for technology news and articles.
I have a long list of questions about PassKeys and none of this articles explains them well enough.
Yes, but that's missing the important part.
Passkeys is not primarily about asymmetric keys. It's about applying asymmetric keys to the Web as an open standard.
The W3C Web-Authn standard is what makes it important and revolutionary.
This is just as important as HTML, CSS and ActivityPub.
Finally we have an open standard that integrates in the web and offers a high level of security.
Is that like TLS client-side certificates?
It's actually quite similar, yes, in the sense that it uses a public/private key pair linked to your account.
But this works on the application layer and you don't use certificates.
Much easier to setup.
Also it generates unique keys per site so it doesn't help anybody track you
Just an example of protocol different than HTTP.
Nothing of that?
You don't need to export or know what is the key.
The key is different for each device.
https://youtu.be/6lBixL_qpro?si=wFFQwrfjQBKDHs5B
But is it possible in the implementation of Android/iOS?
Backups are a thing. With SSH keys I have different key for every device too, but as they are stored in an accessable file (as all computer data should be) they are backed up with the rest of the system.
Keys are stored in the equivalent of iOS’s Secure Enclave (actual name is implementation specific: ARM’s TrustZone, Samsung’s KNOX, Pixel’s Titan M, etc): https://www.howtogeek.com/387934/your-smartphone-has-a-special-security-chip.-heres-how-it-works/
So first, no, all the files should not be accessible : There are special not "files", but keys, like the key used for this method. These keys pose a huge security risk of they are leaked somehow. The key can be something used to encrypt the device/disk, encrypt a connection, and other things associated with encryption.
And because of that security risk, they are often stored in a special chip or simulated chip (like the simulated tpm 2.0 on pc cpu), and not just "stored" so any malware or who knows what can access them just by reading the drive.
Second, the key is never transfered. When you connect to another device, that other device will get another key. Or maybe could it be backed up somehow in case of recovery on another phone? But that would defeat the entire purpose of this.
How Google can do to allow you to connect to another device if the first one is lost, not sure. But it would certainly either ask for a password and a 2fa method.
That's the key question. From what it seems, it would replace a password manager with different passwords for each website, but you give Google control of the master password.
It is not for the password manager...
It's just to connect to the google account.
It is not a service to connect to other ones without passwords.
I just replaced my iPhone, and the few places I “sign in with Apple” still work in the new phone. Yes, you can back it up and restore to a different device. I assume you can also use it across devices but I haven’t tried that
This is something different to PassKeys. "Sign in with Apple" is Apple telling online service "let him in", while PassKeys is storing your authentication data on your device.
i tested it on another device, it looks like it gets the passkey from the source device (not from cloud), i had to input the original device's unlock pattern for it to work
And it's expected as you still had that device. And it's not the same key, a new key has been created for that new device. Now if that device cannot be accessed?
Here is an alternative Piped link(s):
https://piped.video/6lBixL_qpro?si=wFFQwrfjQBKDHs5B
Piped is a privacy-respecting open-source alternative frontend to YouTube.
I'm open-source; check me out at GitHub.