- Edited
Equal2024 I'm pretty sure Apple's implementation is not done this way, but I'm happy to be corrected.
Pretty much, pass(word|keys) are stored and synced via iCloud keychain encrypted with the iPhone passcode with hardware security modules on Apple backend to stop bruteforce.
Equal2024 Okay, so no remote attestation? Or remote attestation, but not through biometric data? Hmm...
Remote attestation is an optional feature websites can request for higher security, biometric is just the way the local password manager lets you access passkeys. You can use whatever you want, face fingerprint, passcode, smile on camera, or none.
Equal2024 The FIDO alliance thinks OTP codes are insecure:
Subject to phishing.
Equal2024 I don't think passkeys are immune to fatigue attacks, either. Are passkeys not also approval-based..?
Yes, you approve login but since passkeys are phishing resistant, at most you are logging in to the real website or app
Equal2024 You can either have an Android device with a passkey, or an iOS device with a passkey
I don’t think there is a way to export Apple -> Google or viceversa, but you can have multiple passkeys for one account, so you could save one for each plarform
Equal2024 Okay, that sounds really annoying. Hardware security keys are already sounding far better. I don't have to get up, go across the room to get my phone, unlock it, approve the passkey notification, and go back to my computer. I can just pickup my security key and plug it in, then tap it.
Passkeys are not created for techie people that intentionally buy multiple security keys, remember which is tied to which account, have with them when they need to login, never break or lose one. Passkeys are for the general public using insecure password with weak or nonexistent 2FA on their account.
cb474 So the account you're logging into knows your public key and you hold the private key. Only the device holding the private key can autheticate the account and nothing is transmitted that can be comprised (only the public key is transmitted). This means passkeys are not subject to phishing attacks
That’s not what makes them resistant to phishing. Passkeys and security keys are origin bound, they only work on the website they were registered on.
cb474 Also, what do you do if you want to login to an account, on someone else's computer, and you don't have your phone?
Well, if don’t have the phone but can still login, then you can proooobably remember the password, but you really should use random, strong, unique passwords stored in a password manager, for which you need a device for anyway.