The cryptography behind passkeys

Vendor lock-in, portability, and exports

  • Many commenters like passkeys’ UX but strongly distrust the ecosystem lock-in, especially Apple/Google/OS-bound implementations.
  • Open-source password managers (Bitwarden, KeePassXC, Strongbox, Vaultwarden, etc.) are praised for storing and syncing passkeys in user-controlled ways, sometimes including plaintext export of key material.
  • That same exportability is controversial: spec authors have warned that clients enabling raw key export could be blocked by websites via attestation, which several see as hostile to user freedom.
  • FIDO is drafting an official “Credential Exchange” import/export standard, but people worry vendors will disable exports “for security” to preserve lock-in.

Attestation, security vs freedom

  • Attestation (proving the authenticator type/vendor) is viewed as both the “best” and “worst” feature.
  • Enterprises want it to enforce hardware-backed, non-exportable keys (e.g., TPM/FIPS devices) and eliminate separate MFA flows.
  • Privacy- and freedom-minded users fear attestation will be used to ban open-source clients, exclude rooted/alt-OS devices, and centralize control.
  • Apple’s consumer passkeys reportedly avoid attestation (empty AAGUID), which some see as a partial privacy safeguard.

Backups, recovery, and hardware keys

  • Hardware tokens (YubiKeys, smartcards, even crypto wallets) are valued for strong, non-exportable security but criticized for poor backup stories (no cloning, manual multi-key enrollment).
  • People debate strategies: multiple keys (local/remote), spreadsheets to track enrollments, safety-deposit storage, or relying on vendor cloud-sync.
  • A recurring fear: house fire / device loss leading to irreversible lockout vs. weaker—but recoverable—mechanisms like email/SMS recovery.

Security benefits vs passwords/TOTP

  • Passkeys are praised for: site binding (phishing resistance), no credential reuse, and not being stored server-side.
  • Critics note that for users already using strong, unique passwords in a good manager with domain-locked autofill, the marginal benefit is smaller.
  • Long debate over TOTP: still phishable and often stored in the same vault as passwords, but dramatically reduces damage from server leaks and credential stuffing.

Usability, DX, and real-world deployments

  • Some report smooth cross-device use with 1Password/Bitwarden and platform passkeys; others describe extremely flaky UX, especially when phone-as-authenticator, Bluetooth, and multiple networks are involved.
  • One implementer rolled back a passkey deployment after widespread support issues; TOTP, while imperfect, remained supportable with well-understood failure modes.
  • Complexity of error handling, recovery paths, and multi-device setups is seen as a major barrier to broad, supported rollouts.

Adoption, tooling, and open questions

  • Perceived traction is mixed: widely integrated on Apple platforms and major sites, but Linux/alt-OS support and CTAP2 “use your phone” flows are still patchy.
  • Some users avoid passkeys entirely until vendor-neutral import/export and open-source-friendly paths are clearly standardized and socially accepted.
  • Technical questions remain about sync “root-of-trust” key strength (especially with low-entropy device PINs) and how exactly TLS/session state interacts with passkey challenges behind CDNs and load balancers.