Don't use passkeys for encrypting user data

Authentication vs Encryption & PRF

  • Many comments stress a core category mistake: treating authentication credentials (resettable) and encryption keys (irreplaceable) as interchangeable.
  • With WebAuthn PRF, a passkey can silently become the basis for an encryption key; if the passkey is lost or deleted, encrypted data is gone.
  • Some suggest “right” designs: per-file/backup encryption keys, each wrapped for multiple passkeys, or PRF-derived keys only as one of several decryption paths.
  • Others argue this is still fragile at scale; for true E2EE, passkeys should never be the only key.

Risk of Loss, Recovery, and User Behavior

  • Commenters disagree whether users will actually delete passkeys “for cleanup,” but multiple anecdotes show people deleting credentials they don’t recognize.
  • Users often don’t know where passkeys live (OS store vs browser vs password manager), or that deletion can cause permanent data loss.
  • Even technical users report accidental overwrites when sites and managers mishandle multiple passkeys per account.
  • Several emphasize: for any E2EE scheme, a fraction of users will always lose keys; passkeys can reduce but not eliminate this.

UX, Implementation, and Cross‑Platform Issues

  • Many describe passkey UX as opaque and inconsistent: different behavior across OSes, browsers, embedded webviews, and password managers.
  • Examples include: sites that only accept PRF-capable passkeys; broken flows on Firefox/Linux; confusion over which device/provider holds the key; Amazon‑style prompts that still ask for 2FA and then “create a passkey” again.
  • Some prefer passkeys stored in cross‑platform managers (Bitwarden, KeePassXC, Vaultwarden) to avoid Apple/Google lock‑in, but note these are second‑class citizens in the ecosystem.

Passkeys vs Passwords, 2FA, and Hardware Keys

  • One camp: strong passwords + password manager + TOTP/hardware 2FA are simpler, portable, and well‑understood; passkeys add complexity for marginal gain.
  • Another camp: passkeys are substantially more phishing‑resistant and, when synced, reduce key‑loss compared to user‑managed E2EE keys.
  • Debate over whether passkeys are “1FA only” or effectively 2FA (device + biometric); some SaaS treat them as 2FA replacements, which others call a conceptual mistake.
  • Hardware keys (U2F/FIDO) are widely praised as conceptually clear (“a physical key for your account”) but seen as too expensive and cumbersome for mass adoption.

Privacy, Attestation, and Lock‑In Concerns

  • Some argue hardware attestation could be used to lock services to specific OS/browser stacks and block open implementations or exportable managers.
  • Others counter that mainstream synced passkeys don’t use attestation, and its real purpose is enterprise control over which authenticators employees can use.
  • There is tension between making secrets non‑exportable (for phishing resistance) and giving users tangible, backup‑able keys they can understand and control.

Adoption, Policy, and Who Passkeys Are For

  • Several worry about forced passkey adoption (e.g., some financial services), especially where platform support is flaky.
  • Older and non‑technical users are seen as especially vulnerable to lockouts, given reliance on a single phone and weak backup habits.
  • A recurring sentiment: passkeys solve real problems, but current specs, tooling, and education are not yet good enough for them to be safely used as sole keys for long‑lived encrypted data.