Passkey technology is elegant, but it's most definitely not usable security

Overall sentiment

  • Thread is highly mixed: many find passkeys elegant in theory but frustrating in practice; a minority (especially all‑Apple users) report they “just work” and feel like a clear upgrade over passwords.
  • Several technically competent users have tried hard and given up, calling current passkey reality “not ready for prime time” or even a failed product; others see messy but acceptable progress for a large ecosystem shift.

Usability and UX problems

  • Major pain: confusing prompts that strongly push the OS vendor’s store (Apple/Google/Microsoft) and obscure alternatives like hardware keys or third‑party managers.
  • Cross‑device use is inconsistent, especially across vendors (e.g., iOS + Windows + Android, or iPad + Android phone).
  • Many sites’ implementations are buggy or half‑baked; some still require passwords/TOTP on top of passkeys or only support a single passkey per account.
  • Users complain they must juggle multiple passkeys per site (for different devices/providers) and manually test whether login actually works.

Vendor lock‑in and account risk

  • Non‑exportable passkeys (and TOTP seeds) are widely seen as intentional lock‑in, not just “safety.”
  • Tying all credentials to Apple/Google accounts scares people given reports of sudden, opaque account bans that cascade into loss of email, photos, phones, and 2FA.
  • Some call for regulation: guaranteed login/appeals windows, bans on disabling “log in with X” after involuntary termination.

Password managers vs platform stores

  • Many prefer cross‑platform password managers (1Password, Bitwarden, Proton Pass, KeePassXC) as the primary passkey or password backend.
  • Advantages cited: works across OSes, easier export/backup (where supported), less dependence on a single cloud ecosystem.
  • But OS/browser integration for third‑party passkey providers is inconsistent; sometimes the OS refuses or makes it hard for them to handle WebAuthn flows.

Hardware security keys

  • Hardware tokens (e.g., YubiKeys) are praised for security and clarity of mental model, but criticized as impractical for everyday users and vulnerable to loss/fire and limited storage slots.
  • NFC/USB support is still uneven across devices, though improving.

Security properties vs real‑world behavior

  • Pro‑passkey side stresses phishing resistance and enforced good credential hygiene (unique, unguessable, non‑reusable secrets).
  • Critics note passwords + good managers already offer near‑equivalent protection for savvy users, without the portability and recovery headaches.
  • Real‑world needs—account sharing with spouses/relatives, tech support for elders, cross‑platform life changes—are often poorly served by device‑ or vendor‑bound keys.

Standards and implementation gaps

  • Server‑side WebAuthn integration is seen as complicated; few simple, drop‑in libraries exist.
  • New FIDO specs for import/export and credential exchange are in draft; some managers already support export, but interoperable, user‑friendly migration and backup are still emerging.