Skrivet av jocke92:
Så har inte jag förstått det. Den enda säkerhetsrisken med passkeys är om någon snor dem. Typ via ett virus eller kommer åt din lösenordshanterare där nyckeln är sparad. Rätta mig om jag har fel
Skulle den vara låst till en enhet kan man ju inte synka den mellan sina enheter.
Nyckeln är unik för varje domän/hemsida. Den går därför inte nätfiska, som man lätt gör med ett lösenord. Skulle man sniffa fram informationen som utbyts vid inloggning så är den bara giltig i en kort stund. Och du har inget lösenord som går att göra bruteforce på.
För fullgott skydd borde man inaktivera inloggning med lösenord sedan, tänker jag. Alternativt att lösenordet ackompanjeras av mfa. Alternativt att man kör ett riktigt långt.
Du har rätt. Jag verkar ha fått fel uppfatting om hur det funkar:
Jag frågade:
Is one part of a passkey stored online and another part locally on one's device?
Svaret:
No, that is not how passkeys work. Passkeys are a new passwordless authentication standard that replaces traditional passwords.
With passkeys:
The entire passkey is stored locally on the user's device, such as a smartphone or laptop. There is no part of the passkey stored online.
When the user needs to authenticate, their device uses the local passkey to cryptographically prove the user's identity to the online service.
This allows for secure authentication without the user having to remember or enter a password. The passkey never leaves the user's device.
The key advantage of passkeys is that they eliminate the need for passwords, which are vulnerable to phishing, data breaches, and other attacks. By keeping the entire passkey stored locally, passkeys provide strong, passwordless security without relying on any online storage or transmission of sensitive credentials.
Jag följde upp med:
What about syncing passkeys to Apple's iCloud or Google? Then they are not stored locally, are they? Or how does that work?
Svaret:
You make a good point. While the core concept of passkeys is to store the entire credential locally on the user's device, there are options to sync passkey data across devices using cloud services like iCloud or Google.
Here's how that works:
The passkey itself is still generated and stored locally on the user's device. It never leaves the device in its raw form.
When the user wants to sync their passkeys across devices, the device uses cryptographic techniques to securely back up and sync an encrypted representation of the passkey data to the cloud service (e.g. iCloud, Google Account).
On other devices the user owns, they can then download and decrypt the synced passkey data, allowing them to access their passkeys on multiple devices.
Even though the passkey data is synced to the cloud, the actual passkey credential is never exposed. The cloud service only has access to the encrypted backup, not the raw passkey itself.
So in summary, while the passkeys are initially generated and stored locally, users have the option to securely sync their passkey data across devices using cloud services, without compromising the core security benefits of the passkey approach. The local device is still the root of trust for the passkey credential.