Passkeys: They're not perfect but they're getting better

Perceived security benefits

  • Passkeys are praised for being:
    • Phishing-resistant, via strict binding to a specific domain.
    • Unique per site, avoiding credential reuse across breaches.
    • Non-extractable in normal flows, unlike passwords that can be copied.
  • Compared to passwords + SMS/TOTP 2FA, they remove common weak points like SMS codes and reused/guessable passwords.

Password managers vs passkeys

  • Some argue that modern password managers with URL-matching autofill already provide strong phishing protection and good UX.
  • For “power users” with unique, long passwords and 2FA, passkeys are seen as only a marginal improvement.
  • Others note that passkeys’ main win is forcing everyone into a password-manager-like model without requiring users to understand password hygiene.

Device loss, backup, and portability

  • Losing a device (or just not having it handy) is a major concern; users fear “losing their fingerprints.”
  • People want:
    • Multiple passkeys per account and easy registration of new devices.
    • Reliable backup and recovery that doesn’t secretly depend on a single cloud vendor.
  • Current import/export between ecosystems (Apple/Google/Chrome/Bitwarden/etc.) is immature or opaque; some fear being stuck if they ever want to switch.

Vendor lock-in, attestation, and user control

  • Strong criticism of FIDO Alliance and big tech for:
    • Pushing device attestation that could let websites refuse certain passkey providers (e.g., open-source managers, non-attested devices).
    • Discouraging plaintext export, which critics see as undermining user freedom and enabling lock-in.
  • Defenders say plaintext export is dangerous and encrypted backup/transfer should be the norm.

Usability and real-world deployments

  • Non-technical users struggle with confusing OS/browser flows, hidden options to use non-default managers, and surprise migrations (e.g., shared Amazon accounts on Apple devices).
  • Good implementations (e.g., a simple “choose passkey → you’re in” flow) are rare but cited as the desired model.

Threat model limitations

  • Passkeys don’t protect against a fully compromised device: malware can hijack sessions or wait for reauthentication prompts.
  • Critics call parts of the TPM/device-bound story “security theater” layered on top of a power grab; supporters respond that hardware binding is still valuable defense-in-depth.