2 replies
  1. tirod
    tirod says:

    Having read more than a few explanations online about passkeys, and looking for what flaw might be my reason not to get one, it boils down to having the passkey stored on just one device in my array. I could share it, yes, but with security first and foremost, having it on just one reduces the risk by 2/3’rds.

    But that is the catch – lose access to the device means no access at all to the passkey. Nobody is explaining recovery, and with biometric verification, I have yet to see how it’s not capable of being stolen. I already know some facial rec systems DO make mistakes as the indicators it scans for are limited. There is also the doppelganger issue – with expanding numbers, there are more people who look like us in the general population than ever. At one time it was calculated to be a dozen, it’s grown since then.

    The major issue I now see is having a passkey on a device and it becoming tied into your banking. This is already a major privacy issue and also a corrupt power play in China, were you can only process financial transactions by phone, and posting online that can be traced back to someone who is then considered undesirable freezes their funds. They literally starve as they cannot get to the money. This has reported been used against a minority there already.

    Passkeys sound like a big advance in security, the hook it, it makes you more vulnerable to select devices which only restricts your access. It also is vulnerable to overt control by government who are known oppressors, and will eventually become just another tool in their arsenal. At least with “secure” and cryptic passwords we were in control of the access we require – they can be used across the internet from any machine. While this is touted as a weakness and exactly how hackers steal our identity or funds, it’s actually our defense – to keep from being corraled into a passkey system which is controlled by a small elite. No? Ask around and see how they react. The honest ones will surmise it’s not impossible, but who can tell, those who plan on doing exactly that will defend it as being unbreakable, or without fallacy. I have already read one online source phrasing passkeys as infallible. Anyone who knows computers can tell you one certainty, if it can be programmed, it can be hacked. And will be.

    For the present, I don’t need a passkey, but I certainly see how the inexorable push among major corporations and governments will make it mandatory – which is all you really need to know. When that happens, it’s forcing it on you.

    Reply
    • Nandor Katai
      Nandor Katai says:

      Hi Tirod,

      Thanks for taking the time to share such a detailed and thought-provoking comment. You’ve raised some very important points that get to the heart of the debate around passkeys, and I really appreciate you sharing your perspective. These are valid concerns that are worth discussing.

      You’re right to question the potential downsides, and I’d like to address some of the issues you brought up:

      On Recovery and Single Points of Failure: This is a crucial issue. While losing a primary device is a risk, the system is designed with recovery options. Most providers allow you to create multiple passkeys for the same account (for example, one on your phone and another on a physical security key). Furthermore, passkeys can be securely backed up to your cloud account (like iCloud Keychain or Google Password Manager), allowing you to restore them on a new device.

      On Biometric Security: You’re correct that no system is 100% infallible. However, the key advantage of passkeys is that your biometric data (your face or fingerprint) never leaves your personal device. It’s only used locally to unlock the cryptographic key stored there. This is fundamentally more secure than passwords, which are transmitted and can be stolen from company servers in data breaches.

      On Privacy and Control: The concerns about potential overreach are understandable with any new technology. However, the current passkey standard (from the FIDO Alliance) is decentralized by design. The “key” is on your device, not in a central database that a single entity can easily control or access. The design is intended to empower the user, not take control away.

      On Hacking: You’ve hit on a core truth of cybersecurity: if it can be programmed, it can be a target. However, the public-key cryptography that powers passkeys is inherently resistant to the most common forms of hacking we see today, like phishing and credential stuffing attacks, which are responsible for the vast majority of account takeovers.

      Ultimately, you’ve highlighted the critical balancing act between security, convenience, and individual control. It’s a conversation we all need to be a part of as this technology becomes more widespread.

      Thanks again for the fantastic comment and for pushing the discussion forward!

      Reply

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply to Nandor Katai Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.