FIDO Alliance publishes new spec to let users move passkeys across providers
Lock‑in, control & exportability
- Many see the new FIDO credential exchange spec as overdue: export/import should have been simple (like CSV for passwords) and available from day one.
- Strong concern that big platforms (Apple, Google, etc.) intentionally made passkeys non‑exportable to create ecosystem lock‑in; users often cannot move keys out of iCloud/Google.
- Others argue the new spec is a net positive: it standardizes what were previously proprietary, opaque export/import mechanisms and should reduce lock‑in.
- Power users want SSH‑style control: raw key files they can copy, back up to paper, or self‑host (KeePassXC, Bitwarden, Vaultwarden). The inability to access private keys directly is viewed as paternalistic.
Security properties & threat models
- Pro‑passkey side:
- Passkeys are per‑site keypairs; private keys stay client‑side and aren’t reused elsewhere.
- They’re resistant to phishing because credentials are bound to domains; browsers won’t use a credential on the wrong site.
- They reduce password reuse and database breach impact.
- Critics reply that:
- If keys can be migrated, they can be stolen; any export mechanism becomes a high‑value phishing/malware target.
- Relying on cloud providers to sync “device‑bound” keys already weakens the hardware‑bound story.
Backups, recovery & multi‑device usage
- Big practical worry: losing a phone or account with synced passkeys could mean losing access to hundreds of services.
- Suggested mitigations: multiple passkeys per account, backup hardware keys, or using a password manager as passkey provider.
- Many sites only allow a single passkey and UX for adding multiple keys is inconsistent.
- Some argue that traditional account recovery (email, backup codes) remains unchanged; others note this re‑introduces phishable fallbacks and undermines “passwordless” claims.
Hardware tokens vs software passkeys
- Hardware tokens (e.g., FIDO keys) are praised for non‑extractable secrets, but criticized as impractical: limited storage for resident keys, easy to lose, and often not supported with multiple registrations.
- Some want non‑resident keys and CA‑like models to avoid hardware storage limits.
Standards, governance & usability
- Several complain the spec is complex and driven by large vendors with misaligned incentives (attestation, potential blocking of “too open” providers).
- Others emphasize that designing something secure and usable “for billions” is intrinsically hard; passkeys already greatly help average users who are routinely phished via SMS/OTP.
- Broad agreement that tooling, browser support, and UX (especially for non‑technical users) are still immature and uneven.