FaceID is just used to unlock the passkey. The key itself is stored in you iCloud keychain.I am just not understanding what part the "faceID" plays in the passkey process if it is not tied to the passkey data?
From the FIDO's own site: "When a user is asked to sign-in to an app or website, the user approves the sign-in with the same biometric or PIN that the user has to unlock the device (phone, computer or security key). The app or website can use this mechanism instead of the traditional (and insecure) username and password."FaceID is just used to unlock the passkey. The key itself is stored in you iCloud keychain.
I haven't had the opportunity to use it yet. But I strongly suspect that you will be able to unlock your passkeys with your passcode. The same way you can unlock normal passwords stored in your keychain.
Passkeys were not invented by Apple by the way. It's a protocol that is also used by hardware security keys like those you can get from Yubico. You can find the details and other vendors here.
That's why you should use something more than a 6 - 8 digit passcode. Use an alphanumeric passcode with numbers, letters symbols. You shouldn't need to use this 99% of the time and instead rely on TouchID/FaceID for general unlocking of your phone.None of that matters if the thief also knows your passcode. Having to use TouchID and FaceID at the same time doesn't change anything when you can still get into an iPhone with just the passcode.
Once someone has your device AND the passode for your phone, it's game over. Doesn't matter if you used passkeys or passwords.So were right back where we started, I guess. Doesn't seem super secure to me if all someone needs is the unlock device PIN. If all the passwords are just behind an unlock PIN how is this more secure? I'm probably just not understanding something here.
Yep, that is what the MR security observers have recommended. Let's see what, if anything, Apple comes up with.So reading though all 603 posts, here's what I've gathered (I may have messed some up, not sure):
01) In order to change your iCloud password you should have to enter in the old/current password AND the device unlock passcode. Ideally, an iCloud passcode change would require: Face ID or Touch ID, current iCloud passcode, and device passcode.
02) All account critical settings on iOS and macOS should (optionally) be able to be locked behind an at least 6 digit passcode with the option to be alphanumeric and CANNOT also be the same as any currently used passcode like iCloud or device unlock. Adding Face ID and Touch ID authentication should be an option here as well.
03) There should be an option to toggle on a 24hr waiting period for an iCloud password reset to take effect.
04) Important apps like banking apps, stock market apps, email or whatever app (or folder) the user chooses, should have the option to be locked behind a passcode which must be entered before they launch. These apps and folder self-lock when the phone locks.
05) Once Advanced Data Protection is on, changing the Recovery Key or turning the Recovery Key off should require the device unlock passcode AND the iCloud passcode and probably Face ID or Touch ID as well. It should also have a 24 hr waiting period as an user-settable option.
06) Screen time passcode should not be able to be added, removed, or changed without iCloud passcode AND device passcode and probably Face ID or Touch ID as well.
07) If FaceID fails for Passwords (in settings), require iCloud passcode AND Device passcode to unlock. Maybe have it always require some passcode.
08) Removing devices from your account through Safety Check should require iCloud passcode and device passcode and probably Face ID or Touch ID as well.
09) Apple could make a “duress” passcode an option, (or button presses) where when it’s used it locks down the phone or erases it (options set by the phone’s owner) or turns on Lockdown Mode.
10) FaceID and Touch ID should not be able to be altered without iCloud Passcode and Device Passcode.
11)
One option discussed is (until Apple fixes it’s security holes, which is a simple fix) to create a kind of “Mobile” Apple ID account that is not the main account but one that has things shared with it, like Calendar, and limited amount of information in things that cannot be shared.
Also, maybe a quick way to enable Lockdown Mode.
I basically just did a few things to my phone and then pretended to be a thief knowing my passcode. My objective was to secure my three main accounts 1) google 2) Microsoft and 3) appleBest solution is to have a 24 hr waiting period on an Apple ID password reset by a device passcode. That will give the victim a chance to remove/wipe the stolen device from the Apple account before the victim is permanently locked out of their Apple account by the thief.
Wow. I just tried that and youre correct. That’s crazy.The big hole in this solution is that Apple foolishly lets you turn-off/change the screen time password by using the device password.
Here’s the flaw. Go to screen time. Then go to “change screen time passcode”. Then go to “turn off screen time passcode”. Then select “forget passcode”. You now have to enter your Apple ID. Which can be easily found by searching your email. Then select ‘forgot password’ for the Apple ID. After it asks for the device passcode, it will then let you enter a new Apple ID password from this screen.
Apple has some big time security flaws!
This is exactly correct. Secure a phone so that's it's difficult to change or update things and people won't use it.My thoughts:
1) Convenience and security are but two sides of the same coin. A longer passcode is also more inconvenient for users to key in on a day to day basis. Making it harder to remember may also lead to less secure practices such as writing it down. Which is why many people default to a 4-6 digit passcode, and I don't think that is going to change anytime soon.
Yes, with 2 billion iphones this is a drop in the bucket social engineering scan as that bru-haha years ago about the "hacking into iclould" to get private pictures. Now to apples' credit they added some not so burdensome security measures to make this type of phishing attack more difficult.2) My understanding of the problem is that it's a social one - people are openly typing their passwords in public, but framing it as such won't make for as engaging a headline because then, it places the blame on the user instead of on Apple. In this case, they really are using their phone wrong. This is another classic case of clickbait headlines by a news outlet to attract clicks and views.
I agree. People in this thread want to the iphone so locked down in the event of a lost or misremembered password they would never be able to recover anything.3) I can see why Apple is not able to respond directly to this, because their rebuttal (you are using your phone wrong) would have likely come across as shirking responsibility and victim blaming. But at the end of the day, I don't think Apple did anything wrong or has otherwise been remiss in any way.
I agree with some there should be somewhat of a delay on the iphone if you use the device passcode to change the apple id password. What that delay looks like and what it does, I don't know. That's apples job to figure out.4) I can think of another solution - linking your Apple Watch to your iPhone so it can only be unlocked when you are near it. This would be another way of doing away with the need to use a passcode in public (assuming Face ID is not an option for some reason). However, this doesn't extend to passwords for like say, when you are paying with Apple Pay. Perhaps Apple could go one step further here (eg: if I am wearing my Apple Watch and meeting a certain set of criteria, I don't need to key in my passcode for a couple of actions on my phone).
All in all, much ado over nothing.
I've been warning about emails for a long time and no one listened... a few posts ago, read it here. This was the 1st thing I mentioned about...The big hole in this solution is that Apple foolishly lets you turn-off/change the screen time password by using the device password.
Here’s the flaw. Go to screen time. Then go to “change screen time passcode”. Then go to “turn off screen time passcode”. Then select “forget passcode”. You now have to enter your Apple ID. Which can be easily found by searching your email. Then select ‘forgot password’ for the Apple ID. After it asks for the device passcode, it will then let you enter a new Apple ID password from this screen.
Apple has some big time security flaws!
Aside from all these tips, it's quite clear to me Apple is the one that benefits most from this chaos, if people are losing their phones, they will end up profiting anyway, because the victims will continue buying from them. If they wanted, all these problems would be gone in the next iOS update. Ask yourselves why this never happens.
Touch ID will be nice but security based onYou just have to be careful when using your iPhone outside in public.
Apple needs to consider bringing back Touch-ID. Two Factor Authentication: Touch ID + Face ID simultaneously
It's not a bug, but a deliberate choice by Apple engineers. In my opinion they could keep the way it is working right now but should give more security conscious users a way to improve security. An optional requirement to use a security key to change the password would be one way to do it.Bug, Apple should fix this.
Android protects its user by producing something people barely want - great strategyStruggling to see how this is even a story.
People looking over your shoulder while you tap in your pin is not news-worthy. But because "Apple" then the WSJ decides to publish this.
Was there any mention in the article about Android users being violated in the same manner? If not, then why not?
What is your problem with what he wrote? Is it a clever reference to the movie Zoolander?seriously? do u own at least a smartphone (any)? are u at least living on planet earth? 🤦♂️🤦♂️
|
I misunderstood and i explained it later. Anyway i watched zoolander many times but don’t remember this phrase 🙂What is your problem with what he wrote? Is it a clever reference to the movie Zoolander?
The victim wasn’t “syncing” local copies with “iTunes” and making back-ups like we did pre-iCloud. Until Saturday, I was doing exactly what the victim was doing: keeping all personal data on one iCloud account that was also logged into iPhone and Mac and locking them out to anyone who didn’t know the account credentials. The victim’s Mac is now a brick unless Apple unlocks it ([edit:Here’s my question: at roughly 6’ 50" into the video, the interviewer says the victim was ”unable to access years of contacts, photos, notes and more.”
How is this possible?
You have a computer.
You get an iPhone.
You turn on Sync for your photos/contacts/notes in Settings on your computer.
You turn on Sync for your photos/contacts/notes in Settings on your iPhone.
The photos/contacts/notes are all resident on your computer so how can the victim be unable to access these photos/contacts/notes on her computer or, if she has a backup, on her backup.
Many thanks.
It's not a bug. It's a feature. It's to provide access to your iphone if you forget your apple id. My guess is when Apple designed this the way it is, an armed robbery scenario was what they were not trying to protect the phone against. Maybe they should rethink that scenario. And maybe if they do, people will get hurt when they didn't before.Bug, Apple should fix this.
You may wonder why this should be considered to be a bug?
1) Try to disable „Find My“ in the Settings. iOS will ask you to enter your AppleID password. This is the correct implementation.
2) Now navigate to Privacy and Security, try to change your AppleID password. iOS now only asks you for your device passcode. This is a faulty implementation, since it conflicts with 1) and undermines the security of your iCloud account.
Apple should fix this. To change the AppleID password, you need to enter the current AppleID password. Problem solved.