• 0 Posts
  • 20 Comments
Joined 2 years ago
cake
Cake day: July 9th, 2023

help-circle
  • If we cut and run every time a big corporation “embraces” a new standard, just to lessen the pain of the day it’s inevitably “extinguished,“ we’d miss out on quite a lot.

    This standard was open from the start. It was ours. Big corps sprinted ahead with commercial development, as they do, but just because they’re first to implement doesn’t mean we throw in the towel.

    Also:

    1. Bio auth isn’t necessary. It’s just how Google/Apple do things on their phones. It’s not part of the FIDO2 standard.
    2. It works with arbitrary password managers including FLOSS and lots of hardware options.
    3. Passkeys can sync to arbitrary devices, browsers, device bound sessions, whatever.

  • Yeah the moods in this thread, like

    “[I don’t understand this]!”

    “[I don’t trust this]!”

    “[It doesn’t fix everything]!”

    “[This doesn’t benefit me]!”

    “[What’s wrong with old way]!?”

    And like, all valid feelings… just the reactions are a bit… intense? Especially considering it’s a beta stage auth option that amounts to a fancy version of the old sec key industry standard, not the mark of the beast.


  • Yeah the counter-interoperability of proprietary expansions on FIDO standards sounds a lot like embrace extend extinguish to me. I know engineering standards generally require field revisions but these big corps have a track record of this behavior.

    I can see how the FIDO standard’s dID requirement might be an issue at the org level, but even in the case of a fully custom/unknown rooted device they have provisions for using traditional security keys attached to one or more associated devices via USB/BT/NFC. Megacorp platforms might be first to facilitate adoption but the spec absolutely accommodates open provider integration.

    I need to experiment with personal security passkey registration and authentication workflows to know how difficult it actually is in practice, but it looks like the equivalent of self-signed certificates are possible anywhere the user controls the stack like self-hosted intranetwork suites that are popular around here.

    Thanks again for the write up!


  • I could see that. I’ve only found a few in the wild (mostly just enterprise, niche tech-related, and big platform web apps) but there’s probably some clunky implementations out there I haven’t suffered through yet.

    For one, there seems to be this idea that if you lose your passkey you get locked out of your account forever.

    True, plenty in this thread even. IIRC there’s usually a recovery key process same as a typical authenticator MFA, sometimes other routes in addition like combining multiple other MFAs or recovery contact assignment. Regardless, completely losing PW manager access across devices would presumably be the more immediate crisis for most.


  • Thanks for the great article! I had a question re: the top disadvantage you mention (lock-in).

    Background: Although the on-device integration for Apple, Google, etc. use their cloud for E2E sync between devices, it appears KeePassXC using their passkey interception, discovery, and import procedures accomplish the same cross-device passkey implementation without needing a particular vendor cloud lock-in. As best I can tell, this meets the original standard’s sync fabric requirements (whether or not the big providers like it) and relies on platform-specific APIs mostly for interoperability.

    Question: If KeePass has been able to implement their own sync this way, and the FIDO standard accommodates non-OS providers (e.g. browsers or PW managers), what is currently the biggest technical hurdle remaining for FOSS-based passkey providers?










  • Oh damn, you’re right! Apparently still a thing.

    I’m not old enough to have used it but I read the ISO about DMAIC at some point and my impression was that, as with agile and other hype-jerk methodologies, there are some legit useful ideas to learn from at the start.

    But once middle managers start treating it like a religion and pumping certifications it’s time to call the honey wagon.


  • Septimaeus@infosec.pubtomemes@lemmy.worldmemories...
    link
    fedilink
    arrow-up
    68
    arrow-down
    1
    ·
    5 days ago

    In case anyone wants to know why, IIRC that format was popularized online by the Despair Inc demotivational posters of the 2000s.

    demotivating poster that reads “mistakes: maybe the purpose of your life is to serve as a warning to others”

    Which themselves satirized the banal and pompous business inspo decor of the dotcom six sigma era that was ubiquitous on the walls of fart whiffer conference rooms, executive offices, and the like.

    motivational framed picture placed that reads “IMAGINATION: What we can easily see is only a small percentage of what is possible.
Imagination is having the vision to see what is just below the surface; to picture that which is essential, but invisible to the eye.”


  • Septimaeus@infosec.pubtoTechnology@lemmy.worldMullvad Leta shutting down
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    5 days ago

    I doubt they’re referring to feature parity WRT machine learning summaries and the like. “Less useful over time” is more likely a gentle way of saying ungraceful performance degradation.

    Escalation in the SEO wars is accelerating. Various culprits but obviously generative NLP technologies designed specifically to sound human are nukes in this metaphor.

    Any index developer that isn’t willing or can’t afford to continue fighting the war must choose:

    1. host a legacy product that rapidly enshittifies
    2. pull the plug now while it still works

    If the index is the developer’s only product, the only real risk of option 1 is damaging their street cred.

    In OP’s case, the index was not even their core product, so option 2 was the wiser decision.