this post was submitted on 28 Feb 2025
538 points (93.4% liked)

memes

12170 readers
2514 users here now

Community rules

1. Be civilNo trolling, bigotry or other insulting / annoying behaviour

2. No politicsThis is non-politics community. For political memes please go to !politicalmemes@lemmy.world

3. No recent repostsCheck for reposts when posting a meme, you can only repost after 1 month

4. No botsNo bots without the express approval of the mods or the admins

5. No Spam/AdsNo advertisements or spam. This is an instance rule and the only way to live.

A collection of some classic Lemmy memes for your enjoyment

Sister communities

founded 2 years ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] Kirk@startrek.website 5 points 16 hours ago (1 children)

Uhhh... Can someone ELI18 to me the problem with passkeys? I use them wherever available and find them very convenient.

[–] LordKitsuna@lemmy.world 2 points 15 hours ago

Yeah i can sum it up for you

[–] Quexotic@infosec.pub 6 points 21 hours ago

Has this energy...

[–] pineapplelover@lemm.ee 2 points 17 hours ago (1 children)

I have the opposite situation, I bought yubikeys but nobody supports them.

[–] Swarfega@lemm.ee 1 points 15 hours ago* (last edited 15 hours ago) (1 children)

Indeed. Why so many recommend them I have no idea.

Honestly, if you have a password manager that supports security keys then buy two cheap keys (one for backup) like the Thetis FIDO U2F Security Key and use those to secure your password vault. For everything else just use TOTP and Passkeys stored in your vault.

I invested in Yubikeys and yes it was a waste.

[–] LordKitsuna@lemmy.world 1 points 15 hours ago (1 children)

I'm getting ready to roll them out at work but it's basically exclusively for the password managers. Having a password manager and every account be unique isn't helpful if everyone's going to just use shit passwords for their password manager

[–] Swarfega@lemm.ee 1 points 14 hours ago

If they have a security key then fuck it, they can use 'password' as a password 😀

[–] airportline@lemm.ee 27 points 1 day ago

You can store passkeys in your password manager lol

[–] Boozilla@sh.itjust.works 14 points 1 day ago (1 children)

Remember when tap-to-pay was new and didn't work at a lot of places and some people were freaked out over it?

And now most of us use it without a 2nd thought.

I speculate passkeys will be like that.

[–] southernbrewer@lemmy.world 3 points 1 day ago (2 children)

I'd use it if it didn't cost extra in my country. Swiping my card really isn't much harder

[–] Boozilla@sh.itjust.works 1 points 10 hours ago

Interesting, I didn't know it costs extra in some places. TIL.

[–] throwback3090 2 points 21 hours ago

Wow that's madness

[–] bennypr0fane@discuss.tchncs.de 28 points 1 day ago (1 children)

Passkeys are one exception to the familiar pattern of "we give you more SeCuRiTY so we can spy on you more and control your behaviour better". They actually are more secure. Problem is, a lot of technical issues with it still, a ton of stuff not working correctly yet

[–] asdfasdfasdf@lemmy.world 5 points 1 day ago* (last edited 1 day ago) (2 children)

I'm still appalled that my Yubikey / FIDO2 still doesnt work on Firefox. I have it as a passkey for GitHub, realized it doesnt work on Firefox, so they just prompt me for my password. That seems backwards to have password as a fallback, too.

load more comments (2 replies)
[–] lightsblinken@lemmy.world 9 points 1 day ago

sure, you can use a passkey as a primary authentication, but only "a device" or "system"(keypass/1pass etc) knows the passkey detail. with only passkey, if my passkey provider/ device is compromised then everything is lost. having single factor auth seems like a bad idea.

a password is something that I can know, so is still useful as a protection mechanism. having two factor auth should include password and passkey, which seems entirely reasonable whilst also providing an easier path forward for people used to TOTP.

[–] nimble@lemmy.blahaj.zone 24 points 1 day ago

On the contrary i want more services using passkeys instead of 2fa methods that are less secure (sms).

[–] powermaker450@discuss.tchncs.de 16 points 1 day ago (2 children)

Unless I've missed something big, passkeys are pretty easy for me if the website supports them imo.

Using KeePassXC, I click register on the website, register the passkey with KeePass, then it just works when I need to authenticate or login. My database is then synced across all my devices.

Passkey support is yet to come to KeePassDX on Android though, so I'll be awaiting that feature

load more comments (2 replies)
[–] darvit@lemmy.darvit.nl 22 points 1 day ago (1 children)

ITT: people who think only SMS, email and TOTP exist as 2FA.

And people who think only your phone can be used as passkey.

load more comments (1 replies)
[–] finkrat@lemmy.world 11 points 1 day ago (4 children)

Passkey is "something you own" right?

I have something I own, it's a Yubikey

[–] Swarfega@lemm.ee 1 points 14 hours ago* (last edited 14 hours ago)

And how many sites support Yubikeys/Security Keys? Not many. I doubt we'll see more either now with Passkeys becoming more prominent.

I have two Yubikeys and other than securing my password manager vault they are rarely used elsewhere.

load more comments (3 replies)
[–] whoisearth@lemmy.ca 5 points 1 day ago* (last edited 18 hours ago) (2 children)

I'll use banks as an example

If they cared about your security there would not be a mobile app or website.

Hell, credit cards would still require a signature.

It's about cost first and foremost and then convenience.

Has nothing about you as a consumer. They don't give 2 shits about you as a consumer.

[–] throwback3090 7 points 21 hours ago (1 children)

I mean you're right about banks but your examples make no sense.

Banks generally don't support 2fa, which is bad. Some banks (fidelity) still have character limits on passwords because they stores it in plaintext until recently so you could use it through the telephone system. They could implement a secure tap to pay system on your phones with enhanced security, rather than relying on Google to handle their job. And for credit cards themselves, switch to chip and pin.

"Banks don't have mobile apps"?? "Signatures are secure"?????🤡

[–] whoisearth@lemmy.ca 1 points 18 hours ago (1 children)

How easy is it to fake a signature for a normal person who has not practiced a person's signature for the intent purpose of faking it? Have you ever tried faking your parents signature to get out of school? I have.

Now the infrastructure required to adequately check signatures is not practical hence it doesn't exist. It's why we moved to pins. Pins are small and 2fa doesn't exist for banks because again it's about the bare minimum and they are out to make money and don't care about customers plus there's government safeguards in place specific to banking.

I will continue to argue that going back in time signatures are infinitely more secure than a 4 digit pin let alone tap but we have traded security for convenience.

Anyways full admit that I'm batshit crazy.

[–] candybrie@lemmy.world 1 points 16 hours ago* (last edited 16 hours ago)

Have you ever tried faking your parents signature to get out of school? I have

Yeah. I've been able to do it since I was 10. It's really easy. I can also fake my husband's and siblings'. It's also a pain in the ass to change your signature. So if someone learns to copy it (like say based on the signature that was literally required to be on the card), it's much hard to change it compared to a pin (which should definitely not be written on the card).

[–] candybrie@lemmy.world 13 points 1 day ago (1 children)

Do you think signatures were at all secure? If they cared about security they'd do chip+pin like most civilized countries.

[–] whoisearth@lemmy.ca 1 points 18 hours ago (1 children)

With proper infrastructure yes signatures are extremely secure. But that proper infrastructure doesn't exist.

[–] candybrie@lemmy.world 1 points 16 hours ago* (last edited 16 hours ago)

I struggle to think of what that extremely secure infrastructure would look like. Are you imagining signing on an electric terminal and having a computer compare signatures at the time of sale? That seems like the most secure and still wildly insecure compared to a pin.

[–] Katana314@lemmy.world 37 points 2 days ago (12 children)

There's been a lot of pain in the attempt to portray it as "Just click the passkey button, and that's it! Your login is secured for life!"

No - Buddy. It is secured for this one specific device that I have biometric authentication for. What about my computer? What about my other computer that isn't on the same operating system? I have a password manager that stores these things, why didn't you save to that when I registered? Why is it trying to take this shit from my Apple Keychain when it's in Bitwarden?

And, the next ultra-big step: How would a non-techie figure this shit out?

[–] candybrie@lemmy.world 1 points 22 hours ago

And, the next ultra-big step: How would a non-techie figure this shit out?

They don't have a computer, another computer with a different OS, or bitwarden.

load more comments (11 replies)
[–] tabularasa@lemmy.ca 55 points 2 days ago (21 children)

The amount of people in this thread that don't understand passkeys surprises me. This is Lemmy. Aren't we the technical Linux nerds of the Internet?

load more comments (21 replies)
[–] IrateAnteater@sh.itjust.works 116 points 2 days ago (12 children)

Passkeys are a great idea, but everyone involved seems like they want the process to be as much of a pain in the dick as possible. So until the industry pulls it's collective head out of its collective ass (not going to hold my breath on that one), it'll be passwords+2FA for me.

load more comments (12 replies)
[–] shininghero@pawb.social 9 points 1 day ago (3 children)

My primary and backup yubikeys: "Am I a joke to you?"

load more comments (3 replies)
[–] lmmarsano@lemmynsfw.com 24 points 2 days ago* (last edited 1 day ago) (1 children)

bitches don't know bout my dick

Bitches don't know bout my awesome passkeys. It's like ssh key authentication for web apps. Just save the passkeys to my password manager & presto: use same keys on all my devices.

It replaces opening a TOTP app to copy a token with a click to select the passkey in a prompt from my password manager.

load more comments (1 replies)
load more comments
view more: next ›