Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Privacy Security

1Password Embraces a Passwordless Future (theverge.com) 40

1Password has announced that passkey support will be available to its customers in "early 2023," allowing users to securely log in to apps and websites without a password. The Verge reports: Passkeys are a passwordless login technology developed by the FIDO Alliance, whose members include most of the Big Tech companies. The tech allows users to replace traditional passwords with their device's own authentication -- such as an iPhone with Face ID -- offering greater security and protection since there's no password to steal or accidentally hand over via a phishing attack.

1Password claims its own variation, called Universal Sign On, will be superior to others by supporting multiple platforms and cross-platform syncing when it launches next year. By contrast, passkey support through companies like Apple is only built to seamlessly synchronize access on devices within the same ecosystem. A live demonstration of how passkeys will work is available for 1Password users using the latest version of its Chrome browser extension, alongside a video demo for those not using the service and a directory listing which websites, apps, and services are using passkeys for authentication. 1Password will bring full support for passkeys to its browser extension and desktop apps in early 2023, with mobile support to follow.

This discussion has been archived. No new comments can be posted.

1Password Embraces a Passwordless Future

Comments Filter:
  • Hard no (Score:5, Insightful)

    by VAElynx ( 2001046 ) on Thursday November 17, 2022 @07:00PM (#63059454)
    This combines two really bad ideas - making logins far too tied to your person, rather than your knowledge, and integrating a login across platforms (which allows other links). Not interested in the least.
    • I was going to say.... Are they switching people from multi-factor to single factor? Using only biometrics is single factor....

      • by Entrope ( 68843 )

        The biometrics are tied to a second factor -- a device you have.

        • by bobby ( 109046 )

          So what do I do when my "device" (I hate that word) breaks, but I still need to live life, access various online accounts, etc?

          I'm already very annoyed at the many logins that shoot me a "a new device is using your account" crap email, when all I've done is take my computer to work, or use a different computer, etc. It's not just annoying, I'm worried they'll start to block my access to my own account.

          Why not give us users the option to choose our authentication method? Unless I'm missing something, a goo

          • You use backup codes (which you can store on another device, ie paper)

          • by AmiMoJo ( 196126 )

            If you don't want to use encrypted cloud storage for your keys, you have a few options.

            You could use a Yubikey, or rather two. One you use, one backup in case you lose the first. You can also use Passkey and a single Yubikey as your backup. I use a single Yubikey and my Pixel phone, which has a Google Titan security key built in, so I always have two devices.

            You can also download recovery codes from the website. You can keep the codes safely in a password manager or offline in a safe, whatever you prefer. I

    • In addition, is access granted to *all* the passkeys on your device(s) via its "own authentication" -- Face ID, PIN, etc...? If so, then it seems that would grant access to *all* your accounts that use Passkey. Sounds like something LEOs (or whoever;s snooping) would love. I'll stick with my individual, unique account passwords at this time...

      • Re:Hard no (Score:5, Informative)

        by AmiMoJo ( 196126 ) on Friday November 18, 2022 @08:52AM (#63060642) Homepage Journal

        There seems to be a lot of FUD about Passkey.

        It replaces your password with a cryptographic handshake. The cryptographic secrets are unique to each site and can be shared among the user's devices via cloud sync or offline sync. Keep in mind that most users use cloud sync for passwords already, due to it being built into Chrome.

        One site being compromised does not expose your secrets for any other site. Your secrets can be secured behind a password or biometric security too.

        For maximum security I recommend using a security key, like a Yubikey. Then you need to plug it in and touch it every time you want to log in. The encryption key is stored on the key itself, not your computer, and the key does all the crypto and validation internally. There is no way to extract the key.

        Yubikey make a biometric version, and some phones have it built in too (e.g. Google Pixel).

        As for your LEA example, it's the same as it is today. If they get your unencrypted PC, they have all the browser cookies and remembered passwords. They can demand the master password for your password manager. Your human brain can't remember many different passwords so either you use a password manager or you re-use crap passwords on many different websites. You can still use 2FA with Passkey.

    • Your FaceID works on YOUR iPhone, not mine. Therefore, it's a mix of something you are and something you have.

      • That doesn't make it any better. For one, I can't have someone trusted access in my stead. For two... I can't exactly deny access to someone with physical reach, can I. So yeah, hard no.
  • by nospam007 ( 722110 ) * on Thursday November 17, 2022 @07:02PM (#63059460)

    It's now called '1'.

  • This seems awfully like SSH pre-shared certificates.
    • It seems that way but its totally not at all like that. Passkeys rely on crypto tokens stored deep in the hardware of the device and cannot be copied, viewed, or shared.

  • > Theyâ(TM)re digital credentials that are stored on your devices, and you access them using biometrics.

    Biometrics are alike a really weak, really shitty password that you can never change. Not a great start there

    > 1Password will help you create passkeys and keep them safe alongside all your private data. It will also sync them securely to all your devices, even across platforms.

    If it can do that, then it also means it can and will leak all your secrets too.

    going to have to take a hard pass on th

    • With your own fMRI and lots of machine learning (and possibly a five dollar wrench), everything is a "biometric" password, lol.

    • by mark-t ( 151149 )
      I will make no argument about being unable to change it, but how do you conclude that biometrics like a really weak or shitty password? The amount of information that is intrinsically encoded into biometric information is extremely dense, and equivalent in security to passwords far longer and more complex than those that could actually be guessed by any password cracking mechanisms invented so far.
      • ... how do you conclude that biometrics like a really weak or shitty password?

        How about 'cause you can unlock a dead guy's phone with his thumb print [youtube.com]?
        Pretty sure they couldn't ask him for his PIN/password. :-)

        Bet this would work even he if was just sleeping, or arrested -- no $5 wrench needed.

        • by mark-t ( 151149 )
          What you are describing are technically loopholes in the technology being widely utilized, not a comparison of how biometrics are supposedly like a weak or shitty password. It is not generally considered "trivial" to use a dead person's corpse to unlock a device, where a weak or shitty password can be trivailly guessed or brute-forced.
          • Re:the crucial flaw (Score:5, Informative)

            by fahrbot-bot ( 874524 ) on Thursday November 17, 2022 @11:02PM (#63060032)

            It is not generally considered "trivial" to use a dead person's corpse to unlock a device, where a weak or shitty password can be trivailly guessed or brute-forced.

            Sure, but your alive thumb can easily be used by law enforcement (or whoever) whereas your unknown password cannot, so I would consider the former weaker at protecting things than the latter.

            • by mark-t ( 151149 )
              Again, however, this is well outside of the domain of "trivial" that is ordinarily associated with the weaknesses behind shiitty passwords.
        • by AmiMoJo ( 196126 )

          If you use biometrics on your phone then learn how to quickly disable them. On Android press the power button five times rapidly. You can configure exactly what it does, e.g. notifying certain contacts or recording video.

          Also check out PanicKit and Wasted, two apps you can use to lock or wipe your device in an emergency. You can set up things like duress passwords that wipe the phone instead of unlocking it.

  • False (Score:5, Insightful)

    by DarkRookie2 ( 5551422 ) on Thursday November 17, 2022 @07:10PM (#63059498)
    There is no "passwordless" future. They are just generated by your phone without your input under the complete control of Apple/Google.
    • by slazzy ( 864185 )
      Correct, or pay 1password $3 a month as a multi-platform alternative. Really it's just marketing fud for automatically generated passwords.
      • by zshXx ( 7123425 )
        There are saner alternatives. Bitwarden is lot more reasonable password manager with great feature set for free users. They are working on passkeys as well. PS: Just a bitwarden fan.
    • Re:False (Score:5, Informative)

      by AmiMoJo ( 196126 ) on Friday November 18, 2022 @09:05AM (#63060674) Homepage Journal

      Passkey is not generating passwords. It uses cryptographic keys that have a few advantages over passwords.

      Passwords are at best stored in hashed form. That makes them vulnerable to dictionary and reasonable-time brute force attacks. The cryptographic keys used by Passkey/U2F are designed to make those attacks impractical.

      Because the keys are specified, there is no issue with passwords meeting certain criteria (8 characters, including a mix of cases etc.) or being badly designed.

      Public key crypto ensures that even if the entire login process is captured by an adversary, it won't allow them to re-use the data.

      Because there is no keyboard entry, keylogging doesn't work. Malicious Javascript can't access anything useful.

      Phishing sites don't work because the cryptographic handshake depends on the domain and the server's certificate. Even if it looks identical to the real site, the browser won't present the right credentials to log in.

      You can use a security key like a Yubikey to keep the cryptographic secret off your computer entirely. There is no way for it to be stolen by malware, as it never leaves the security key and all crypto is handled by its internal processor. Most keys have a button you must press to activate the cryptographic handshake, so malware can't use the key without user interaction either.

      • cryptographic keys = very,very,very complex password.

        I still don't want to reply on a porn machine or a device use to transfer porn for security.
        • by AmiMoJo ( 196126 )

          Crypto keys are not passwords. They use public key crypto so that your private key is never transmitted.

          • Whatever it is, it is something I am not in complete control of and the people that are are not people worth trusting.
            • by AmiMoJo ( 196126 )

              How are you not in complete control of it? You can build your own open source hardware key if you are really worried. All the validation and crypto takes place on the key, it just takes in a signed challenge, validates it, and spits out a signed response. Key never even enters the computer's memory or CPU, and the crypto code is unalterable in the key's MCU if you decide to make it so.

              Your paranoia is making you use much less secure system.

  • ... was 0Password already taken or what?

    anyway, good luck with your bulls^H^H^H^H^H^Hproduct.

  • That's a definite NO.

    "Online privacy" as spelled out in the TOS is a lie wrapped in a truth.

    We won't share your information... ONLY with our partners, data brokers, and with governments for legal reasons, who will then share with their partners, and so on...

    So, Everybody.
  • by Anonymous Coward
    Nobody likes the current ones, so they just create a new one that they think is somehow better than everybody else's and everybody will just jump onboard and use it.
  • If it embraces password-less authentication, then it should be called 0Password.

    • You still have a password, it's just that your device knows it not you .,... ...and the company promises to not tell anyone what it is ,,unless they want to ...

  • If an attacker were to intercept the entire login process, public key cryptography would prevent happy wheels [happywheelsgame.io] them from reusing the data they gathered.

Always draw your curves, then plot your reading.

Working...