skepller@lemmy.world to Programmer Humor@programming.devEnglish · 4 months agoGitHub authlemmy.worldimagemessage-square69linkfedilinkarrow-up1671arrow-down116
arrow-up1655arrow-down1imageGitHub authlemmy.worldskepller@lemmy.world to Programmer Humor@programming.devEnglish · 4 months agomessage-square69linkfedilink
minus-squareEvotech@lemmy.worldlinkfedilinkarrow-up2·4 months agoIt’s not about encryption/security it’s about creating something that can’t be phished. We know that 2fa is secure. But if an attacker can trick you into giving them the code, or typing it in a fake box. Then they own you. Passkeys are made so that there’s nothing to give, nothing to type. You must control the device.
minus-squareramjambamalam@lemmy.calinkfedilinkEnglisharrow-up2·4 months agoSSH keys are more like passkeys than passwords.
It’s not about encryption/security it’s about creating something that can’t be phished.
We know that 2fa is secure. But if an attacker can trick you into giving them the code, or typing it in a fake box. Then they own you.
Passkeys are made so that there’s nothing to give, nothing to type. You must control the device.
SSH keys are more like passkeys than passwords.