JollyRancher Phishing resistance is a function of the user.
This is incorrect. At the moment, true passkeys are near phishing-proof. Meaning, if I try to use my Microsoft passkey to login at fakemicrosoftonline.com, it'll fail. It simply won't work. Aka, I can't be phished. However, let's say fakemicrosoftonline.com simply asks for my TOTP code. No problem, I enter it in and they're passed along to authenticate the attacker instead of me. I've been phished.
Yes, the user should know better, but that's not what I'm arguing. I'm arguing that the method itself (passkeys) are inherently much more secure than any other method.
JollyRancher basically all of the implementations are a mess
I agree with this for most mainstream consumer products. However, in the enterprise world, it's pretty consistent and works as intended/designed.
JollyRancher essentially everyone who offers passkeys doesn't allow the disabling of other methods
See my point above. Seems to mostly affect consumer/mainstream services. Enterprise services work fine for the majority of them.
JollyRancher the security is equal to whatever the weakest level is
Completely agree, this makes it extremely frustrating when you can't disable less secure methods. I'm looking at you, Proton...