bdjegifjdvw@lemmy.world to Programmer Humor@programming.dev · 1 day agoI love password based loginlemmy.worldimagemessage-square180linkfedilinkarrow-up11.27Karrow-down123
arrow-up11.24Karrow-down1imageI love password based loginlemmy.worldbdjegifjdvw@lemmy.world to Programmer Humor@programming.dev · 1 day agomessage-square180linkfedilink
minus-squarenibbler@discuss.tchncs.delinkfedilinkEnglisharrow-up7·13 hours agodont think so. what i gatherd passkeys is a public/private key scheme, much like pubkey auth in ssh logins.
minus-squareBCsven@lemmy.calinkfedilinkarrow-up3arrow-down1·12 hours agoIts still just a single factor if some body steals your private key.
minus-squareGt5@lemmy.ziplinkfedilinkarrow-up2·12 hours agoYes, buts it’s not something that can be easily guessed or found on a post it on the monitor
minus-squareBCsven@lemmy.calinkfedilinkarrow-up1·10 hours agoTrue dat. But if they compromise your computer the first thing the look for is key files. Like my ssh keys are in a root permission file. Protected from general sight, but if somebody compromises my PC with a CVE on then goodbye keys. At least with hardware key it is removable and requires a button press. So accessing becomes physical access or quantum computer cracking
minus-squarenibbler@discuss.tchncs.delinkfedilinkarrow-up1·10 hours agoIts never transmitted, can be stored in HSMs. Anything that’s handled wrong is unsafe
minus-squareBCsven@lemmy.calinkfedilinkarrow-up2·9 hours agoSteals it from your system I meant. Which has even happened to security pros.
dont think so. what i gatherd passkeys is a public/private key scheme, much like pubkey auth in ssh logins.
Its still just a single factor if some body steals your private key.
Yes, buts it’s not something that can be easily guessed or found on a post it on the monitor
True dat. But if they compromise your computer the first thing the look for is key files.
Like my ssh keys are in a root permission file. Protected from general sight, but if somebody compromises my PC with a CVE on then goodbye keys.
At least with hardware key it is removable and requires a button press.
So accessing becomes physical access or quantum computer cracking
Its never transmitted, can be stored in HSMs. Anything that’s handled wrong is unsafe
Steals it from your system I meant. Which has even happened to security pros.
Phew!