So I’ve no idea how these work. Sounds great if you are using your own device. But what happens if you left your phone at home, and want to log on to, e.g. internet banking on a friend’s PC. Will it just be impossible? Or you’re on holiday and lose your phone, are you locked out of everything until you get your phone replaced when back home?
You need your phone, or another device synced with your passkey. If this is bad for you, then you should continue to use passwords. The problem though with passwords is how many people use bad passwords or old breached passwords or variants of passwords, etc. Passkeys eliminate these problems, so you have to assess what you want with your online accounts, do you want to be able to login at random computers, or do you want better account security?
So that sounds that Passkeys will only work if a website offers it. In the Apple Event it sounded like you can replace any passeord with a Passkey.
They never made it sound like that. They were quite clear this is based on an open standard that web servers need to support, webauthn.
Does anybody know how this will work if I share an account with my partner? For example, we have one account for our newspaper app or for our energy company, could I then share my passkey?
You can send her the passkey over Airdrop. People can share accounts using this method.
"The phone will store the token and private-key portion of the token on your iCloud Keychain",
1. but what you have not explained is what entities (companies) have access to the token and private-key portion?
2. Does it work with a local private keychain?
3. Can the user control access to the token and private-key?
This seems like other Apple security features, in that it is half baked to make Apple look good.
1. No one but you has access to the private key. It's stored on device, though it can be synced to other devices with your iCloud account (using another layer of encryption between devices so even Apple can't get your Passkeys). The "token" you speak of sounds like a session parameter which companies do need to use to track your logins, but this has nothing to do with Apple's technology, everyone is using session variables or else there would be no sessions.
2. It is a system keychain, it is local and it is private but it's not something you can directly access.
3. As said above, private key is local but Apple doesn't give you direct access to it, presumably so you can't send it to a scammer online who would use it to steal your stuff.
What a bunch of none sense .
So instead of storing a password they will store a file in your computer? Now I am tied to the computer I am currently using? What happens if the hard drive gets wiped?
Passwords are great because they can be memorised and used any where. There is no need for Apple to do this as any password manager can do the same really if they agree on a standard. Either way, passwords on servers are stored in encrypted form therefore any one who access them can't make much use of them because it will like reading hieroglyphs without the Rosetta Stone.
None the less, general public will find it amusing that "it just works!" until their data gets corrupted or lose access to icloud.
You're recommended to backup your device, or you use more than one device (iCloud syncs passkeys with another layer of encryption). If you don't backup your device, then yes please use passwords, but most people would be well-served with passkeys, which are fully optional by the way, you can still use passwords and not give a crap about the existence of passkeys.
Passwords have their use but a lot of people are better served with passkeys. For instance, we don't need 2-factor any more with passkeys.
my understanding is that reputable companies never have your passwords, they have something called "hashes" which is encrypted form of the password
Hashes are used to compare a supplied password while not needing to know the password itself. The issue with hashes is they have hash tables generated to guess at a person's password, and the worse a person's password is, the more they are susceptible to a data breach. Such a thing is not possible with passkeys, as they can have a full breach of the server side public key and it won't help an attacker at all.
I'm afraid that you are right. But that means that the design is flawed. For example, my mortgage bank has given my wife and me one account. With a passkey, we would have to choose who has access. This example is not unique in any way, even though it doesn't apply to the majority of accounts. Yet, these are very important accounts where passkey's won't be usable.
You can share passkeys over Airdrop. You can also use multiple passkeys on an account, so it's possible for an Android device to have its own passkey and an Apple device has a passkey.