Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
As long as you can remove those security keys just with an iPhone and its unlock code I can't take them seriously.

It's like having a big heavy door for your house, but the walls are made of paper.
 
1) You don't ever type in your Passkey
2) Your private Passkey is stored on your device, not the site you're logging into
3) The website can get hacked and that never exposes your private Passkey
4) The Passkey isn't transmitted to the website when you log in

So let's say my Passkey is my iPhone. What happens if I lose it/gets stolen?
 
Passkey is 2FA as it’s something you have (the authorised device with the passkey) and something you are (Face ID or Touch ID) or something you know (device passcode).

Oh so the website needs to suppose Passkey? If they don't, we're stuck with the old login + 2FA method?
 
It should be noted that it also needs a bluetooth connection, in order to prove proximity.


Nope.


Yup.


It's more secure because each passkey can only be used to log in at one site, and since it's using asymmetric crypto, can't be eavesdropped or similar.


Sure.. but most people don't bother with that, and it's also possible to slip up there.


If this is a concern for you, just use a longer device password.
Then what’s the point, the whole idea is to eliminate passwords?
 
Again I repeat; it’s designed to *replace* your Apple ID password. Why is a passcode still necessary?
The Apple ID password is still there, and it's used outside of the web sign in. Maybe it "replaces" the password in the long term but it's not 100% there yet.

Also, passcode != password. The passcode will still exist for individual devices and will be required to use the device fully, and we don't really know if biometrics will replace passcodes, it may be a little dangerous to try to rely 100% on biometrics, companies are worrying about law enforcement (they can't make you put in a passcode but can make you biometric authenticate), criminal gangs that might be able to 3D scan your face (just wear a headset that looks like the Vision Pro, with a similar camera array it can build a 3D model of your face, they just have to walk around you, then 3D print the model, then use the face model to get into your phone), so at the very least the phone can lock out biometrics if it thinks it's stolen (it knows it's somewhere it's never been). But someone can also see you put your passcode in or record it with said headset.
 
The Apple ID password is still there, and it's used outside of the web sign in. Maybe it "replaces" the password in the long term but it's not 100% there yet.

Also, passcode != password. The passcode will still exist for individual devices and will be required to use the device fully, and we don't really know if biometrics will replace passcodes, it may be a little dangerous to try to rely 100% on biometrics, companies are worrying about law enforcement (they can't make you put in a passcode but can make you biometric authenticate), criminal gangs that might be able to 3D scan your face (just wear a headset that looks like the Vision Pro, with a similar camera array it can build a 3D model of your face, they just have to walk around you, then 3D print the model, then use the face model to get into your phone), so at the very least the phone can lock out biometrics if it thinks it's stolen (it knows it's somewhere it's never been). But someone can also see you put your passcode in or record it with said headset.
Solution to that? Require a passcode only when you manually lock the phone. You can do this by squeezing volume up and power buttons together
 
Passkeys are great, but personally, I'll stay away from using Apple Passkeys due to the fact that their implementation of authentication in iOS falls back to the Passcode after 3 failed biometric attempts.

We all know that we shouldn't be using the same password for different services, but with Apple's implementation of Passkeys, if a malicious actor has your phone and your passcode, now they can authenticate into the apps / services which you have configured to use with your iOS passkeys, too.
(That is in addition to what they could already do: sign you out of your other Apple devices and lock you out of your Apple ID account.)
Essentially, it's as if the Passcode is a password that you use for everything.

I'll wait until 1Password releases their version with support for Passkeys, which will probably have a more secure implementation than Apple's.
I would only use Apple passkeys if they make it possible to disable the fall back to the Passcode.
 
Last edited:
Why not just use a complex alpha numeric passcode? With TID and FID It’s not like you have to enter it very often (we use our AID as our device passcode, that way nobody forgets either one.)
This is the best approach, for now at least.

If someone can reset your Apple ID password if they spy your PIN passcode, then make your passcode your alphanumeric Apple ID password. It’s a lot harder to spy on and if they happen to see it, then your Apple ID password would’ve been compromised anyway.

Ultimately, the solution could be to set up a password reset hierarchy. Your Mac at home would have the capability to reset your Apple ID and override your iPhone as long as you know one of the old passwords from say within the last 48 hours. You could set up a physical passkey as the top of the hierarchy so that if you don’t have a Mac or it was stolen/lost along with the iPhone, you’d have this USB key in the bank or a safe or someone around the house.
 
Unfortunately on iOS, the backup to Face-ID for the iPhone's Keychain or PassKeys is the iPhone's passcode. So anyone that has access to your phone and knows the passcode, can use the phone's passcode to log-in to iCloud or Apple ID with this feature.
That’s no different than the current design if you have your Apple ID saved.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.