this post was submitted on 24 Sep 2023
81 points (94.5% liked)

Programming

17111 readers
308 users here now

Welcome to the main community in programming.dev! Feel free to post anything relating to programming here!

Cross posting is strongly encouraged in the instance. If you feel your post or another person's post makes sense in another community cross post into it.

Hope you enjoy the instance!

Rules

Rules

  • Follow the programming.dev instance rules
  • Keep content related to programming in some way
  • If you're posting long videos try to add in some form of tldr for those who don't want to watch videos

Wormhole

Follow the wormhole through a path of communities !webdev@programming.dev



founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] anti_antidote@lemmy.zip 23 points 1 year ago (22 children)

Can someone tell me why I should care about this rather than just continuing to use my password and 2FA?

[–] Greensauce@sh.itjust.works 19 points 1 year ago (16 children)

I’m stealing this from another comment:

The main advantage comes with phishing resistance. Standard MFA (time based codes) is not phishing resistant. Users can be social engineered into giving up a password and MFA token. Other MFA types, such as pop up notifications, are susceptible to MFA fatigue. Similar to YubiKeys, Passkeys implement a phishing resistant MFA by storing an encryption key, along with requiring a biometric. The benefit here is that these are far easier for the average user, and the user does not need to carry a physical device. Sure, fingerprints could possibly be grabbed with physical presence, but there is far less risk that a users fingerprint is stolen, than a user being social engineered over the phone into giving creds. For most organizations and users, this is far more secure.

[–] SorteKanin@feddit.dk 11 points 1 year ago (3 children)

Standard MFA (time based codes) is not phishing resistant. Users can be social engineered into giving up a password and MFA token.

So basically this is just idiot-proofing the system. If you aren't the type of person to give your password or MFA token to another person, then passkeys don't really make better security.

[–] whosdadog@sh.itjust.works 9 points 1 year ago

It also allows you to login without someone visually observing your password while typing it on a keyboard or on an untrusted device that could have a keylogger.

load more comments (2 replies)
load more comments (14 replies)
load more comments (19 replies)