Passkeys and Modern Authentication

Exportability, Specs, and User Freedom

  • Strong disagreement over specs forbidding plaintext export of private keys and mandating complex HPKE-based export flows.
  • One side: export in cleartext is obviously insecure; at minimum exports should be passphrase‑encrypted, and non‑exportable keys (e.g., YubiKeys) are a feature.
  • Other side: the protocol should not dictate the user’s security model; blocking even encrypted export removes user choice, complicates archival, migration, and handling of deceased users’ accounts, and creates de‑facto lock‑in.
  • Concern that “temporary minimums” (allowing encrypted exports now) may disappear later as standards tighten.

Lock‑in, Attestation, and Power Asymmetry

  • Fear that attestation plus RP choice will let sites whitelist only big-tech or “approved” managers, excluding open-source tools; KeePassXC’s Github thread is cited as a warning signal.
  • Some argue this is analogous to sites rejecting weak passwords or requiring corporate MFA apps; services already choose what they deem secure.
  • Others see this as constructing technical chokepoints that governments and corporations can later weaponize for real‑identity requirements and platform lock‑in.

Security Benefits vs. Phishing and TOTP

  • Security practitioners in the thread are broadly positive on passkeys: they remove passwords, are phishing‑resistant, and close common holes (TOTP phishing, reused passwords, credential stuffing).
  • Passkeys are seen as weaker than “password + hardware key” but stronger than password+TOTP or email codes; TOTP is described as obsolete for high‑stakes use because phishing it is easy in practice.
  • Critics counter that data breaches and provider screw‑ups are larger real‑world risks than phishing, and that exportable secrets (passwords, TOTP seeds) remain more user‑controllable.

UX, Recovery, and Family Use

  • Many report serious UX pain: multi‑step AWS logins, confusing flows, unclear “where the passkey lives,” and broken experiences across devices and kids’ phones.
  • Non‑exportable keys make migration between managers (hundreds of sites) or off ecosystems (Apple, Google) daunting; backup stories (lost devices, SMS‑only recovery, Authy desktop deprecation) drive skepticism.
  • Some propose mitigating via multiple passkeys per account, hardware keys, and family‑oriented SSO‑like dashboards, but note these don’t really exist for consumers yet.

Alternatives and Comparisons (SSH, X.509, SSO)

  • A camp argues SSH‑style public‑key auth “solved” login with far less complexity; passkeys add attestation, RP IDs, and privacy logic largely to handle web tracking and phishing.
  • Others respond that SSH’s fingerprint / TOFU model fails for most users, and WebAuthn’s binding to the relying party is a genuine improvement.