Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Gawd sometimes I hate passkeys.

Gawd sometimes I hate passkeys.

Scheduled Pinned Locked Moved Uncategorized
88 Posts 30 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • gamesmissed@mastodon.socialG gamesmissed@mastodon.social

    @karlauerbach One of my parents has arthritis in their hands, and putting in a rotating passkey in 30 seconds is genuinely difficult for them some days. It makes them panic, and they just want to go back to using passwords with no time limit.

    diazona@techhub.socialD This user is from outside of this forum
    diazona@techhub.socialD This user is from outside of this forum
    diazona@techhub.social
    wrote last edited by
    #35

    @GamesMissed @karlauerbach Those four digit codes aren't passkeys, they're something different. (They're called TOTP authenticator codes, not that you need to know that.) Passkeys - the thing people earlier in the thread are talking about - are a newer thing, kind of like a password that's stored in your computer, and you just have to "unlock" them by doing some simple action like touching a button or scanning your fingerprint or typing in a PIN (which doesn't have to ever change). At least, that's the theoretical idea, though in practice they often wind up being kind of hard to set up.

    By the way for the 30-second rotating codes (TOTP), you might want to know that you don't have to enter the code before the next one shows up. There's a grace period where a code is still valid even though it's not showing up on the authenticator app (or whatever). I think it might be another 30 seconds, maybe longer, but I'm not sure offhand.

    karlauerbach@sfba.socialK 1 Reply Last reply
    0
    • diazona@techhub.socialD diazona@techhub.social

      @GamesMissed @karlauerbach Those four digit codes aren't passkeys, they're something different. (They're called TOTP authenticator codes, not that you need to know that.) Passkeys - the thing people earlier in the thread are talking about - are a newer thing, kind of like a password that's stored in your computer, and you just have to "unlock" them by doing some simple action like touching a button or scanning your fingerprint or typing in a PIN (which doesn't have to ever change). At least, that's the theoretical idea, though in practice they often wind up being kind of hard to set up.

      By the way for the 30-second rotating codes (TOTP), you might want to know that you don't have to enter the code before the next one shows up. There's a grace period where a code is still valid even though it's not showing up on the authenticator app (or whatever). I think it might be another 30 seconds, maybe longer, but I'm not sure offhand.

      karlauerbach@sfba.socialK This user is from outside of this forum
      karlauerbach@sfba.socialK This user is from outside of this forum
      karlauerbach@sfba.social
      wrote last edited by
      #36

      @diazona @GamesMissed Thanks for the explanation.

      (I was aware that the multiple digit 2FA numbers that come via email or text are not part of passkeys. Same for the six digit things generated my RSA keyfobs and Authenticator apps. I do not know the correct nouns for these things. BTW, I'm somewhat familiar with the workings of things based on public key cryptography - Whit Diffie worked in my computer/network security research group way back when. Here's a somewhat recent photo of me and Whit:

      Link Preview Image

      diazona@techhub.socialD 1 Reply Last reply
      0
      • karlauerbach@sfba.socialK karlauerbach@sfba.social

        @diazona @GamesMissed Thanks for the explanation.

        (I was aware that the multiple digit 2FA numbers that come via email or text are not part of passkeys. Same for the six digit things generated my RSA keyfobs and Authenticator apps. I do not know the correct nouns for these things. BTW, I'm somewhat familiar with the workings of things based on public key cryptography - Whit Diffie worked in my computer/network security research group way back when. Here's a somewhat recent photo of me and Whit:

        Link Preview Image

        diazona@techhub.socialD This user is from outside of this forum
        diazona@techhub.socialD This user is from outside of this forum
        diazona@techhub.social
        wrote last edited by
        #37

        @karlauerbach @GamesMissed Understood, you don't need to prove your credentials to me. It's just that the post I was replying to was conflating passkeys and TOTP codes, and I thought clearing that up would be useful (if not to you, at least to other people reading the thread).

        1 Reply Last reply
        0
        • oddhack@mstdn.socialO oddhack@mstdn.social

          @GhostOnTheHalfShell @karlauerbach @GamesMissed My Novobanco website login takes my username / passcode(*), then requires authenticating me via the app on my phone (which requires only the same passcode). Every time I race to login to the app - because the notification will not show up in the app if I'm already logged in - and approve it within 30 seconds.

          (*) The passcode entry screen is a 10 digit keypad. But the numbers are not where you expect them to be. And they move, each time.

          Link Preview Image
          ghostonthehalfshell@masto.aiG This user is from outside of this forum
          ghostonthehalfshell@masto.aiG This user is from outside of this forum
          ghostonthehalfshell@masto.ai
          wrote last edited by
          #38

          @oddhack @karlauerbach @GamesMissed

          That sounds more frightening than I want to think about

          oddhack@mstdn.socialO 1 Reply Last reply
          0
          • S shadsterling@mastodon.social

            @karlauerbach I still haven’t seen a good concise summary of how to use passkeys in any context, but my vague impression of them is that if I enable them then my access ends when the device fails - and eventually every device will fail, so I’m not using passkeys

            karlauerbach@sfba.socialK This user is from outside of this forum
            karlauerbach@sfba.socialK This user is from outside of this forum
            karlauerbach@sfba.social
            wrote last edited by
            #39

            @ShadSterling Passkeys are somewhat clever. They use the ability of public/private crypto keys to perform an identity challenge that is unique every time it is used. The private key is stored on your machine(s) and the matching public key is on the website/service. A biometric is usually used to allow the private key to be taken from its storage (which could be a protected, trusted bit of hardware, or not) and a random challenge is sent to the website. That website has to unwrap that challenge using the public key and return the challenge (or a digest of it) back to the client and who can check whether the unwrapped challenge is correct. As with most things cryptographic, there are many devils lurking in the details and there are vulnerabilities in unexpected places - such as in public key systems one has to take care not to accept a bogus "public" key.

            Update: I made some errors, particularly with regard to who issues the challenge and how it is processed.

            S 1 Reply Last reply
            0
            • ghostonthehalfshell@masto.aiG ghostonthehalfshell@masto.ai

              @oddhack @karlauerbach @GamesMissed

              That sounds more frightening than I want to think about

              oddhack@mstdn.socialO This user is from outside of this forum
              oddhack@mstdn.socialO This user is from outside of this forum
              oddhack@mstdn.social
              wrote last edited by
              #40

              @GhostOnTheHalfShell @karlauerbach @GamesMissed it is cursed beyond reason. Portugal is not big on accessibility in general, and this design pattern is explicitly hostile towards *everyone* using the website.

              1 Reply Last reply
              0
              • oddhack@mstdn.socialO oddhack@mstdn.social

                @GhostOnTheHalfShell @karlauerbach @GamesMissed My Novobanco website login takes my username / passcode(*), then requires authenticating me via the app on my phone (which requires only the same passcode). Every time I race to login to the app - because the notification will not show up in the app if I'm already logged in - and approve it within 30 seconds.

                (*) The passcode entry screen is a 10 digit keypad. But the numbers are not where you expect them to be. And they move, each time.

                Link Preview Image
                karlauerbach@sfba.socialK This user is from outside of this forum
                karlauerbach@sfba.socialK This user is from outside of this forum
                karlauerbach@sfba.social
                wrote last edited by
                #41

                @oddhack @GhostOnTheHalfShell @GamesMissed What you are describing is not a passkey system. What you describe seems to be a name:time-based-authenticator system. Usually passkey systems only require a login name and a biometric (the biometric is processed locally on your machine and not transmitted.)

                A lot of financial institutions use this method. Indeed many banks hand out RSA fobs to customers to use. These generate a new 6-digit authentication sequence every 30 seconds or so. There are also software versions, such as the Google Authenticator App.

                (When I was working on various things at "the labs" sometimes we had to pass through rotating gates, kinda like jails, and we were physically locked in until we had passed all the identification/authentication tests. I never felt comfortable when locked in that way.)

                oddhack@mstdn.socialO 1 Reply Last reply
                0
                • nomdeb@mstdn.socialN nomdeb@mstdn.social

                  @karlauerbach Dealing with my MIL's tech at her assisted living facility is a nonstop time suck. And it repeats. And nobody on staff is particularly good at helping either. At this point I've just stopped trying. If she can watch tennis on TV and get her texts on her phone, I just am too burned out with it to jump through hoops anymore. BUT I am thinking through how to set things up for ourselves in our old age. How to simplify.

                  karlauerbach@sfba.socialK This user is from outside of this forum
                  karlauerbach@sfba.socialK This user is from outside of this forum
                  karlauerbach@sfba.social
                  wrote last edited by
                  #42

                  @nomdeb I have similar issues with my mother at a living facility. She regularly destroys the software or hardware of her devices by pushing every button (sometimes at the same time) and pounding on things as if she were on a chain gang breaking rocks.

                  Most recently she bricked, somehow, her iPhone to the degree that it had to be replaced by a new one. (Fortunately I had set it up to back up pretty much everything important to Apple's iCloud - I trust Apple with things far more than I would were it an Android phone and Google.)

                  nomdeb@mstdn.socialN 1 Reply Last reply
                  0
                  • ghostonthehalfshell@masto.aiG ghostonthehalfshell@masto.ai

                    @karlauerbach @rodneylives @Bodling

                    That means that grain is going to get more expensive for the simple reason that it will probably have to travel around the tip of South America.

                    It’s a real pile of drought in America’s bread basket plus fertilizer constraints at a bad time, plus extreme weather.

                    Building a supply chain with no tolerance to it. It’s kind of a problem.

                    2/2

                    karlauerbach@sfba.socialK This user is from outside of this forum
                    karlauerbach@sfba.socialK This user is from outside of this forum
                    karlauerbach@sfba.social
                    wrote last edited by
                    #43

                    @GhostOnTheHalfShell @rodneylives @Bodling I've heard about the Panama drought problem. But you are right that it is under-reported.

                    Back during the first trump term China realized that the US has become an unreliable supplier of grain, particularly soy.

                    So China made investments in grain growing countries, such as Argentina, to create solid product-moving infrastructure, such as good roads, good railroads, and deepwater docking facilities - thus greatly reducing the shipping costs and thus effectively permanently putting US growers at a net price disadvantage vis-a-vis non US growers of soy.

                    China clearly has strategic long term thinkers and investors, something the US seems to have depleted.

                    hyc@mastodon.socialH 1 Reply Last reply
                    0
                    • karlauerbach@sfba.socialK karlauerbach@sfba.social

                      @ShadSterling Passkeys are somewhat clever. They use the ability of public/private crypto keys to perform an identity challenge that is unique every time it is used. The private key is stored on your machine(s) and the matching public key is on the website/service. A biometric is usually used to allow the private key to be taken from its storage (which could be a protected, trusted bit of hardware, or not) and a random challenge is sent to the website. That website has to unwrap that challenge using the public key and return the challenge (or a digest of it) back to the client and who can check whether the unwrapped challenge is correct. As with most things cryptographic, there are many devils lurking in the details and there are vulnerabilities in unexpected places - such as in public key systems one has to take care not to accept a bogus "public" key.

                      Update: I made some errors, particularly with regard to who issues the challenge and how it is processed.

                      S This user is from outside of this forum
                      S This user is from outside of this forum
                      shadsterling@mastodon.social
                      wrote last edited by
                      #44

                      @karlauerbach that’s about how passkeys work, not how to use them

                      karlauerbach@sfba.socialK 1 Reply Last reply
                      0
                      • karlauerbach@sfba.socialK karlauerbach@sfba.social

                        @nomdeb I have similar issues with my mother at a living facility. She regularly destroys the software or hardware of her devices by pushing every button (sometimes at the same time) and pounding on things as if she were on a chain gang breaking rocks.

                        Most recently she bricked, somehow, her iPhone to the degree that it had to be replaced by a new one. (Fortunately I had set it up to back up pretty much everything important to Apple's iCloud - I trust Apple with things far more than I would were it an Android phone and Google.)

                        nomdeb@mstdn.socialN This user is from outside of this forum
                        nomdeb@mstdn.socialN This user is from outside of this forum
                        nomdeb@mstdn.social
                        wrote last edited by
                        #45

                        @karlauerbach YES!!!!!! Said with feeling. So much feeling. Exactly this. She also refuses any efforts I make to get her occupational therapist help to teach her stuff that she uses frequently like the TV remote control. Or learn to use voice controls. All the deep sighs. I did lol to see a book titled stupid things my parents did that I will avoid. 😂 but more seriously I am planning as best as I can to keep up with tech that will help in my own old age and try for simplicity.

                        nomdeb@mstdn.socialN 1 Reply Last reply
                        0
                        • cavyherd@wandering.shopC cavyherd@wandering.shop

                          @karlauerbach

                          That's...a thing I worry about. I've started to see "Set up a passkey" as a default page I have to click past. The first time, I nearly started to set it up, but then had a think based on some mutterings I'd heard On Here.

                          I'm and Old, & a Luddite, & very much •dis•inclined to jump on the latest fad, so I have not set up any passkeys. Sounds like I very much don't want to.

                          karlauerbach@sfba.socialK This user is from outside of this forum
                          karlauerbach@sfba.socialK This user is from outside of this forum
                          karlauerbach@sfba.social
                          wrote last edited by
                          #46

                          @cavyherd Do consider setting up passkeys. They are a great improvement over passwords and one usually does not forget to carry one's biometrics wherever one might choose to go. Often setting up a passkey is so painless that one might not even notice that it was done. (It is annoying on my Mac Mini because that machine does not have Apple's fingerprint button, so I usually set up passkeys on my other Apple devices and let them be [hopefully securely] propagated via Apple's iCloud sharing.)

                          One of the weakness of passkey is that you usually need a computer/phone onto which the private key part of the desired passcode has been propagated - so you usually need your smart phone or laptop, you can't expect to be able to walk up to an arbitrary computer, while wearing nothing but your birthday suit, and securely log in. With passwords you could do that - although I rarely see a naked person doing banking.

                          hakfoo@mstdn.partyH cavyherd@wandering.shopC 2 Replies Last reply
                          0
                          • nomdeb@mstdn.socialN nomdeb@mstdn.social

                            @karlauerbach YES!!!!!! Said with feeling. So much feeling. Exactly this. She also refuses any efforts I make to get her occupational therapist help to teach her stuff that she uses frequently like the TV remote control. Or learn to use voice controls. All the deep sighs. I did lol to see a book titled stupid things my parents did that I will avoid. 😂 but more seriously I am planning as best as I can to keep up with tech that will help in my own old age and try for simplicity.

                            nomdeb@mstdn.socialN This user is from outside of this forum
                            nomdeb@mstdn.socialN This user is from outside of this forum
                            nomdeb@mstdn.social
                            wrote last edited by
                            #47

                            @karlauerbach truly there should be a whole career field of tech for geriatrics including building it into assisted living facilities (or homes) and training people for hire who can be called out. Assisted living IT person is just a hook up the TV sort.

                            1 Reply Last reply
                            0
                            • crystalmoon@chaos.socialC crystalmoon@chaos.social

                              @karlauerbach which for transfers is OK, but for paying a bill and setting money aside? ugh

                              karlauerbach@sfba.socialK This user is from outside of this forum
                              karlauerbach@sfba.socialK This user is from outside of this forum
                              karlauerbach@sfba.social
                              wrote last edited by
                              #48

                              @crystalmoon I live in the Apple world, so for most bank transactions, or paying bills, or even buying something at a store, I find that the most I need is my face (for facial recognition biometric) or my finger (for fingerprint biometric).

                              My banks seem to have some sort of size/dollar threshold that triggers the use of a time-based authenticator, like an RSA widget or Google Authenticator app. Because we own a business we usually have to do that when dealing with our business accounts.

                              crystalmoon@chaos.socialC 1 Reply Last reply
                              0
                              • S shadsterling@mastodon.social

                                @karlauerbach that’s about how passkeys work, not how to use them

                                karlauerbach@sfba.socialK This user is from outside of this forum
                                karlauerbach@sfba.socialK This user is from outside of this forum
                                karlauerbach@sfba.social
                                wrote last edited by
                                #49

                                @ShadSterling I'm a techie so I often skip the "how does one use this" and jump to the "how does it work under the skin" mode.

                                Normally one encounters a passkey when logging into a website or service.

                                Usually there is the normal "who are you" phase in which enter an email address or user name or something.

                                Then you simply activate the biometric thingy on your device - on my iPhones it is the camera looking at my face, on my Macbooks it is the fingerprint key. (And on my other devices - I have to cancel out and hope that the service still has a username/password method of getting in.)

                                Once the biometric is taken then some packets get exchanged (usually quite quickly) via the net and you get let into the service.

                                It's pretty easy, a lot easier than remember and entering a password.

                                S 1 Reply Last reply
                                0
                                • karlauerbach@sfba.socialK karlauerbach@sfba.social

                                  @ShadSterling I'm a techie so I often skip the "how does one use this" and jump to the "how does it work under the skin" mode.

                                  Normally one encounters a passkey when logging into a website or service.

                                  Usually there is the normal "who are you" phase in which enter an email address or user name or something.

                                  Then you simply activate the biometric thingy on your device - on my iPhones it is the camera looking at my face, on my Macbooks it is the fingerprint key. (And on my other devices - I have to cancel out and hope that the service still has a username/password method of getting in.)

                                  Once the biometric is taken then some packets get exchanged (usually quite quickly) via the net and you get let into the service.

                                  It's pretty easy, a lot easier than remember and entering a password.

                                  S This user is from outside of this forum
                                  S This user is from outside of this forum
                                  shadsterling@mastodon.social
                                  wrote last edited by
                                  #50

                                  @karlauerbach what on earth does “encounters a passkey” mean? That sounds like an item I might pick up in a game by stepping on it.

                                  Pasting a password from my manager is trivial. Having multiple passwords for multiple accounts on the same site is easy. Syncing my password file across devices is routine.

                                  With passkeys I’ve never seen a clear statement that using multiple devices is possible, much less whether multiple browsers on the same device get treated as different devices

                                  karlauerbach@sfba.socialK 1 Reply Last reply
                                  0
                                  • S shadsterling@mastodon.social

                                    @karlauerbach what on earth does “encounters a passkey” mean? That sounds like an item I might pick up in a game by stepping on it.

                                    Pasting a password from my manager is trivial. Having multiple passwords for multiple accounts on the same site is easy. Syncing my password file across devices is routine.

                                    With passkeys I’ve never seen a clear statement that using multiple devices is possible, much less whether multiple browsers on the same device get treated as different devices

                                    karlauerbach@sfba.socialK This user is from outside of this forum
                                    karlauerbach@sfba.socialK This user is from outside of this forum
                                    karlauerbach@sfba.social
                                    wrote last edited by
                                    #51

                                    @ShadSterling My passkeys work across my devices (I am within the Apple kingdom of computer and phones.) Apple propagates a lot of this between your machines via iCloud. (My Linux and FreeBsd machines are often operated remotely and without a console/keyboard - so doing a biometric with a passkey on those machines is kinda a pain, but for those I have pre-established SSH keys.)

                                    With the way that HTTP works (with or without TLS - that's the S in HTTPS) each connection from any browser on the same machine begins as a distinct engagement with the service. Should the service bind those together (using cookies or something) that is a matter for the service software, not part of the way that passkeys work.

                                    S 1 Reply Last reply
                                    0
                                    • karlauerbach@sfba.socialK karlauerbach@sfba.social

                                      @cavyherd Do consider setting up passkeys. They are a great improvement over passwords and one usually does not forget to carry one's biometrics wherever one might choose to go. Often setting up a passkey is so painless that one might not even notice that it was done. (It is annoying on my Mac Mini because that machine does not have Apple's fingerprint button, so I usually set up passkeys on my other Apple devices and let them be [hopefully securely] propagated via Apple's iCloud sharing.)

                                      One of the weakness of passkey is that you usually need a computer/phone onto which the private key part of the desired passcode has been propagated - so you usually need your smart phone or laptop, you can't expect to be able to walk up to an arbitrary computer, while wearing nothing but your birthday suit, and securely log in. With passwords you could do that - although I rarely see a naked person doing banking.

                                      hakfoo@mstdn.partyH This user is from outside of this forum
                                      hakfoo@mstdn.partyH This user is from outside of this forum
                                      hakfoo@mstdn.party
                                      wrote last edited by
                                      #52

                                      @karlauerbach @cavyherd

                                      "One does not forget to carry one's biometrics".

                                      Except they're inaccessible on VERY common use cases like "desktop PC without webcam" or "public kiosk".

                                      So we have to do terrible Rube Goldberg flows for non-smartphone users. I really don't want my digital life centered around a delicate theft-target device that's mostly a vector for funneling personal data to an American bigtech.

                                      TOTP 2FA can be run on a freaking Commodore 64. Emailed codes are tech-agnostic.

                                      karlauerbach@sfba.socialK cavyherd@wandering.shopC 2 Replies Last reply
                                      0
                                      • karlauerbach@sfba.socialK karlauerbach@sfba.social

                                        @GhostOnTheHalfShell @rodneylives @Bodling I've heard about the Panama drought problem. But you are right that it is under-reported.

                                        Back during the first trump term China realized that the US has become an unreliable supplier of grain, particularly soy.

                                        So China made investments in grain growing countries, such as Argentina, to create solid product-moving infrastructure, such as good roads, good railroads, and deepwater docking facilities - thus greatly reducing the shipping costs and thus effectively permanently putting US growers at a net price disadvantage vis-a-vis non US growers of soy.

                                        China clearly has strategic long term thinkers and investors, something the US seems to have depleted.

                                        hyc@mastodon.socialH This user is from outside of this forum
                                        hyc@mastodon.socialH This user is from outside of this forum
                                        hyc@mastodon.social
                                        wrote last edited by
                                        #53

                                        @karlauerbach @GhostOnTheHalfShell @rodneylives @Bodling China has been around for thousands of years, all their thinking is long term compared to anywhere else. And they invented bureaucracy too, which ensures that a system will be in place to implement and oversee plans that span far beyond any individual's lifetime.

                                        1 Reply Last reply
                                        0
                                        • hakfoo@mstdn.partyH hakfoo@mstdn.party

                                          @karlauerbach @cavyherd

                                          "One does not forget to carry one's biometrics".

                                          Except they're inaccessible on VERY common use cases like "desktop PC without webcam" or "public kiosk".

                                          So we have to do terrible Rube Goldberg flows for non-smartphone users. I really don't want my digital life centered around a delicate theft-target device that's mostly a vector for funneling personal data to an American bigtech.

                                          TOTP 2FA can be run on a freaking Commodore 64. Emailed codes are tech-agnostic.

                                          karlauerbach@sfba.socialK This user is from outside of this forum
                                          karlauerbach@sfba.socialK This user is from outside of this forum
                                          karlauerbach@sfba.social
                                          wrote last edited by
                                          #54

                                          @hakfoo @cavyherd 2FA is good (certainly more secure than a simple password) and, as you point out, requires few resources (apart from the need to have a 2nd communications medium to carry the 2nd factor messages.) But it does have vulnerabilities, particularly if the attacker has ways to affect the routing of the 2nd factor to the user. For instance Telco routing of that 2nd factor via SMS has been a source of attack.

                                          cavyherd@wandering.shopC 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups