Nice dismissal and rebuttal. Just shut down any possible chance of debate with “it’s conspiracy theory”. Works every time like a charm.Talk about a bunch of tinfoil hattery.
There’s nothing to debate, as it’s nonsense. It’s no different than the options to unlock your phone.Nice dismissal and rebuttal. Just shut down any possible chance of debate with “it’s conspiracy theory”. Works every time like a charm.
When a person has no facts, they result to criticizing the messenger. Which if fine by me because it shows exactly who they are. The relevant fact here is that neither of us know the truth, but I am willing to accept that and am still open to the possibility that I am wrong. Tin foil hat person will never admit they don't know and may be wrong.Nice dismissal and rebuttal. Just shut down any possible chance of debate with “it’s conspiracy theory”. Works every time like a charm.
A hash can be stolen just as a password can. Same difference.
Hashes are used to compare a supplied password while not needing to know the password itself. The issue with hashes is they have hash tables generated to guess at a person's password, and the worse a person's password is, the more they are susceptible to a data breach. Such a thing is not possible with passkeys, as they can have a full breach of the server side public key and it won't help an attacker at all.
On Apple devices on the same iCloud account the same passkey should be available anywhere. Across Apple accounts I assume it would either allow you to Airdrop it or do a setup as a new device (that is synced with your personal Apple account). On new devices when you try to sign in for the first time the website would ask for you to authenticate with one of your registered device first, then website will create another passkey that would be tied to the new device. Future sign-ins would no longer require the first device.I'm not sure I understanding how this will work. The way I understand it, I have to create the passkey on one device and the mortgage company stores something on their end too. Do I get to go through the process twice, and does the mortgage company have two store two things for the one account? Or will Apple (and others) allow me to share the passkey (including the secret) with others? or .....?
Yes. Compatible across browsers and across different OSs since Google and Microsoft both committed to adopting the standard.Sometimes, I need to use Chrome as Safari can’t render the webpage correctly. I wonder whether this will be compatible with other browsers on apple devices.
A hash is a numeric representation of the password. It goes 1 way. If I have the hash, I can only know the password when I have the password already, and I can verify that by putting the password into the hash function and I get the same value as the stored value. However, I can’t know what the password is through the hash unless I have the password, this is why it’s very useful, because people breach databases all the time, but they only get hash values of passwords and not the passwords themselves. There’s also the addition of salting passwords that makes it so that you can’t use a “standard” password hash table to compare, you would have to rehash everything which is computationally intensive.i do not get it, a lot of websites got breached but because of hashes or encrypted form of password on the server no 128bit encryption that no one has broken yet?
Even if you have a passkey, won't that site/server have something to compare it too to make sure its correct and that can get compromised and the passkey can be regenerated or something?
I understand though for the average joe its a smoother ride instead of remembering his passwords but one issue remains and that is where is the passkey stored and how do I regenrate it if its stolen? Now I can ask for a password reset to my email (which is secure with a password) to get a new password, if I will use passkey for everything then how does that work? I can remember my password but I can't remember my passkey
i do not get it, a lot of websites got breached but because of hashes or encrypted form of password on the server no 128bit encryption that no one has broken yet?
Even if you have a passkey, won't that site/server have something to compare it too to make sure its correct and that can get compromised and the passkey can be regenerated or something?
I understand though for the average joe its a smoother ride instead of remembering his passwords but one issue remains and that is where is the passkey stored and how do I regenrate it if its stolen? Now I can ask for a password reset to my email (which is secure with a password) to get a new password, if I will use passkey for everything then how does that work? I can remember my password but I can't remember my passkey
Needless to say, my wife and I do not share the same iCloud account. At this point, Apple doesn't allow sharing passwords nor passkeys. So unless Apple changes this, it is up to the website to provide the option to have multiple passkeys for the same account. Given how it works with passwords + 2FA Authentication Apps, I don't have high hopes of websites providing this option. At least I am not aware of any website that allows my wife and myself to both have the 2FA setup on our two different phones.On Apple devices on the same iCloud account the same passkey should be available anywhere. Across Apple accounts I assume it would either allow you to Airdrop it or do a setup as a new device (that is synced with your personal Apple account). On new devices when you try to sign in for the first time the website would ask for you to authenticate with one of your registered device first, then website will create another passkey that would be tied to the new device. Future sign-ins would no longer require the first device.
A private key has to be processed by a hash algorithm on the server before being compared with the public key for authentication. It's also implemented so that you can't just do a simple comparison with the public key, otherwise it would be no different than a text password. This way even if the public key was compromised you account stays secure. Hashed values (in this case the public key) are designed to be irreversible, meaning that it would not be possible to reverse engineer a private key from the public key. On a high level OAuth 2.0 sign-ins like Sign In with Apple does something similar.i do not get it, a lot of websites got breached but because of hashes or encrypted form of password on the server no 128bit encryption that no one has broken yet?
Even if you have a passkey, won't that site/server have something to compare it too to make sure its correct and that can get compromised and the passkey can be regenerated or something?
I understand though for the average joe its a smoother ride instead of remembering his passwords but one issue remains and that is where is the passkey stored and how do I regenrate it if its stolen? Now I can ask for a password reset to my email (which is secure with a password) to get a new password, if I will use passkey for everything then how does that work? I can remember my password but I can't remember my passkey
Needless to say, my wife and I do not share the same iCloud account. At this point, Apple doesn't allow sharing passwords nor passkeys. So unless Apple changes this, it is up to the website to provide the option to have multiple passkeys for the same account. Given how it works with passwords + 2FA Authentication Apps, I don't have high hopes of websites providing this option. At least I am not aware of any website that allows my wife and myself to both have the 2FA setup on our two different phones.
So, what I am hearing is, there is no technical reason why it can't work. But it doesn't mean that it will be possible.
Apple demonstrated in the developer video on Passkeys that you can send a passkey over Airdrop. So as long as you both have Apple devices you can share the passkey just fine.Needless to say, my wife and I do not share the same iCloud account. At this point, Apple doesn't allow sharing passwords nor passkeys. So unless Apple changes this, it is up to the website to provide the option to have multiple passkeys for the same account. Given how it works with passwords + 2FA Authentication Apps, I don't have high hopes of websites providing this option. At least I am not aware of any website that allows my wife and myself to both have the 2FA setup on our two different phones.
So, what I am hearing is, there is no technical reason why it can't work. But it doesn't mean that it will be possible.
Thank you for sharing this! I missed this unfortunately. Thank you for enlightening meApple demonstrated in the developer video on Passkeys that you can send a passkey over Airdrop. So as long as you both have Apple devices you can share the passkey just fine.
No problem. The video is like 30 minutes and it’s developer focused.Thank you for sharing this! I missed this unfortunately. Thank you for enlightening me.
No, even if a website was hacked, getting a bunch of public keys won't help them. Let's use this very simple example. You have setup passkeys on a website (banana.com). When you go to log in to banana.com, you send your username (MacBH928) to the site. The site looks your account up and finds the PUBLIC key that has been created for you. The site then creates a challenge and encrypts the challenge. For simplistic sake, let's say banana.com encrypts a random word ("television") with your public key. Since the word is encryped wiht your Pubic key, only your Private key can decrypt it. The website sends your computer the encryped message. Your computer decrypts it to get the original word (television) and sends it back to the server. The server confrims the word received matches the word it sent and authenticates you, since only someone wiht your Private key can decrypt the message.
So, this is more secure because the security of the private information is no longer on single point of failure (the website storing password hashes.) Now, the private information is stored on millons of individual computers. Even if a hacker were to get all the public keys, there is NOTHING they can do with them. Heck, I could publish my public key for every website I visit and not be worried. It is the private key that needs to remain secure.
Can I just implore you to read the Apple site on Passkeys I linked above? Feels like there’s a lot of things you’re misunderstanding and it would help if you understood the whole idea before coming up with these questions.So each user will have a permenant public AND private key , his private key stored on his device and the public key is shared with all websites (or does each website has a different public key?)
ok, what happens if I lose my private key? how do I back it up? What about my iCloud account? It stores the backup of my private key but since I do not have the private key it won't be able to unlock with passkey.
What happens if someone gets a hold of my private and public key?
Also, since this is all done by Apple and stored on apple iCloud, isn't it possible that Apple has access to both keys of every Apple Passkey user?
No, there will be different public and private keys for EACH website. Even if a website was hacked, the public keys would not help with any other websites. (And don't forget the public key alone is useless.)So each user will have a permenant public AND private key , his private key stored on his device and the public key is shared with all websites (or does each website has a different public key?)
What happens if you forget your password now on a website? Oh yea, there is almost always a recovery method. Websites are going to have a recovery method.ok, what happens if I lose my private key? how do I back it up? What about my iCloud account? It stores the backup of my private key but since I do not have the private key it won't be able to unlock with passkey.
First, the public and private keys are kept completely separate so obtaining both of them (and tying them together) is extremely unlikely. As a comparison, it is more likely that a hacker obtains your password in a breach AND happens to find your phone (to use as a 2FA) on the street.What happens if someone gets a hold of my private and public key?
Apple NEVER will have the public key. It is not store with private key. The public key is store on the originating website.Also, since this is all done by Apple and stored on apple iCloud, isn't it possible that Apple has access to both keys of every Apple Passkey user?
Nope. You should read up on the standard. In a nutshell, this is a new cross-platform authentication solution that will be able to replace the current password/2FA combo. It will be similarly convenient on Windows and Android since Google and MS are both also committed to supporting this.So in a nutshell, they're reinventing the password manager. Such as Bitwarden. Except it's slightly more convenient on iOS... and much less convenient on Windows or Android. Yay?
I tested it out on BestBuy.com. I got the passkey setup but I had to use Safari on my iPhone to set it up, the BestBuy app said the device/OS didn't support Webauthn. I don't think Best Buy has implemented this correctly as it did not remove my password from my account. This just becomes another optional way to sign in which kind of defeats the security gains you are suppose to get by switching to webauthn. If it is not going to remove my password then what is the point?
No, even if a website was hacked, getting a bunch of public keys won't help them. Let's use this very simple example. You have setup passkeys on a website (banana.com). When you go to log in to banana.com, you send your username (MacBH928) to the site. The site looks your account up and finds the PUBLIC key that has been created for you. The site then creates a challenge and encrypts the challenge. For simplistic sake, let's say banana.com encrypts a random word ("television") with your public key. Since the word is encryped wiht your Pubic key, only your Private key can decrypt it. The website sends your computer the encryped message. Your computer decrypts it to get the original word (television) and sends it back to the server. The server confrims the word received matches the word it sent and authenticates you, since only someone wiht your Private key can decrypt the message.
So, this is more secure because the security of the private information is no longer on single point of failure (the website storing password hashes.) Now, the private information is stored on millons of individual computers. Even if a hacker were to get all the public keys, there is NOTHING they can do with them. Heck, I could publish my public key for every website I visit and not be worried. It is the private key that needs to remain secure.
Nope. You should read up on the standard. In a nutshell, this is a new cross-platform authentication solution that will be able to replace the current password/2FA combo. It will be similarly convenient on Windows and Android since Google and MS are both also committed to supporting this.