logoalt Hacker News

maple314205/15/20254 repliesview on HN

Isn't it the same for passkeys? I can put passkeys in password managers like Bitwarden, 1password, ...


Replies

Spooky2305/15/2025

Yes. Passkeys help with the bad password problem. That’s a big deal but doesn’t magically solve everything.

To address other security risks more comprehensively, you need to have a tight issuance process and use something key based in hardware. I’m working on a project where we deploy Yubi keys or similar, with an audit trial of which is used by who.

High trust environments need things like enterprise attestation and a solid issuance process to meet the control needs. Back in the day, the NIST standards required a chain of custody log of the token - you could only use in person delivery or registered mail to send them.

That’s overkill, but the point is the technology is only one part of the solution for these problems.

zie05/16/2025

Within the larger spec, you can whitelist a set of known devices, such as only allow Yubikey's, etc. Which would prevent the private key material from getting into your password manager.

shim__05/15/2025

You can but the server can require an device attestation during registration, proving that you're actually using an Yubikey or whatever. That isn't possible with TOTP

jerf05/15/2025

> > Incidentally, passkeys go into my password manager too. You can probably work the math from there.