The FIDO2/WebAuthn spec allows for multiple credentials to be registered. I would strongly recommend getting a hardware security Key as a backup and keep in in a secure place (safe deposit box at the bank?). That way, if you loose your phone, you can retrieve your backup key and log into accounts. I have a 3 YubiKeys that I register with every FIDO capable site.
I honestly prefer it this way because it offers more protection and security.It is the year 2022 and Apple still requires users to have SMS as a fallback two-factor method
I honestly prefer it this way because it offers more protection and security.
I wouldn't rely on that. Read the indemnity clauses that banks make you agree to when getting a safe deposit box. There are no guarantees that anything you put in there is safe. YMMV, you'll have to decide for yourself if this is more or less secure than storing in your own home/workplace/family member's house.safe deposit box at the bank?
And the fallback has saved me before.It is the year 2022 and Apple still requires users to have SMS as a fallback two-factor method
I wouldn't rely on that. Read the indemnity clauses that banks make you agree to when getting a safe deposit box. There are no guarantees that anything you put in there is safe. YMMV, you'll have to decide for yourself if this is more or less secure than storing in your own home/workplace/family member's house.
How does this factor in someone accessing the accounts of someone who passes away? I have a binder of all my acconts and passwords for my wife in the event that I die. What will she do if this service becomes dominant?
Not sure how you could interpret my post as being against mandatory 2FA. I didn’t mean that.I honestly prefer it this way because it offers more protection and security.
I suppose the objective is not to replace all passwords/log-in services, but those which rely on passwrods stored in password managers.My main concern with "passwordless" logins is authentication from "first principles".
If you don't have any of your own devices, and want to log into your accounts from a brand new, unknown device, what do you do? I have a couple of critical passwords memorized so that I can get into my stuff if I lose all my devices. These companies seem intent on eliminating all passwords, but at some point you have to have a way to log in if you're starting from scratch.
Conversely, if they do have a mechanism for logging in from scratch, how do they secure it so a bad actor can't pretend to be you logging in from scratch?
I learned a lot from this. Great response! Thanks for typing this out.Sure! This happens to be an area of interest for me.
The root of this technology is public-key cryptography. With PKC, there are always two related keys: A private key, and a public key. The public key is easily derived from the private key, but the private key cannot be derived from the public key. The public key can decrypt anything encrypted by the private key and vice-versa, but they cannot decrypt things they themselves encrypt without the other key.
When you are signing up, your local device generates the keys, sends the public key to the service you are accessing (this is effectively your "password", but much more secure), and stores the private key in secure storage (so on an iPhone, the Secure Enclave).
In the future, when you log in, the website sends a challenge, which is just a random string of bytes. You unlock the private key on your local device (for iPhone, using biometrics), and sign the challenge locally. A digital signature is a cryptographic hash of the contents of the message being signed (in this case, the server challenge), which is then encrypted with your private key. When you send the signed challenge back to the server, it uses the public key to decrypt the signature (thus verifying it was you that signed the challenge) and then verifies that the hash of the challenge is correct (thus verifying you signed what the server sent and not some other string of bytes). Since the signature both verifies that 1) your private key is the one that created the signature and 2) the challenge the server sent is the one that was signed, you are securely authenticated without needing to send your secret to the server.
Pretty cool, huh?
Edit: answering the other question: Yes, there are some changes that need to be made to websites to handle this. They need to be able to store the public keys, and they need to be able to handle the challenge and response. The WebAuthn standard handles this for websites, and there are a lot of drop-in libraries for just about any web application stack now.
They will remove your face and...So once you’re dead and gone; how will access to these sites be gratnted if you were to leave details to loved ones?
It would be handled the same way as your organizational SSO and/or Yubikey. A token is sent and that token is used to mathematically validate your identity.Can someone explain the security of this? Obviously I doubt that my facial data would be shared with the website, but how does it remain secure?
Would website devs need to drastically change how they code websites or would the phone handle the translation between the website asking for a password and the user just being able to scan their face?
Except it is a hash generated from a mathematic representation of your data. Fun fact, though: (I am not a lawyer) it seems that biometrics and other passwordless systems have less legal protections than a password/passcode: https://www.biometricupdate.com/201...etrics-protected-by-fifth-amendment-get-murkyCouldn't one argue that a password is still needed, it just changes from a text password to a biometric one like FaceID?
Same thing with those "keyless entry" doors that require an RFID badge or something rather than an old school key.
Sorry, just like thinking of the logic of this stuff.
Except it is a hash generated from a mathematic representation of your data. Fun fact, though: (I am not a lawyer) it seems that biometrics and other passwordless systems have less legal protections than a password/passcode: https://www.biometricupdate.com/201...etrics-protected-by-fifth-amendment-get-murky
It stores the passkeys on your keychain, which is backed up to iCloud, so the existing methods for restoring from iCloud into a new phone would apply.What happens if you lose the device used to authenticate your face or such, your mobile phone? How do you recover then?
is this like the app "ping id" and "hyper"?
A bit pedantic, but those are NOT PO boxes, they are PMBs (private mail boxes) and considered completely different from a legal standpoint. I do not know about the specific case you mentioned, but it sounds like maybe the warrant did not specify the PMB whose contents were to be collected. Otherwise, they messed up and overstepped the bounds of the warrant, but I am not a lawyer, so...Also mailboxes at shops too. There is a famous case where the FBI had a search warrant for a PO box at one of those shops that do printing and shipping.
Turns out they took ALL the boxes. the other people were screwed the contents were taken as well.
took a LOT of work to get it back.