

131·
4 days ago
- Built-In Two-Factor Security – Passkey logins use your private key stored on your device and your face or your fingerprint or your PIN. Unlike password, these cannot be easily replicated by a scammer.


- Built-In Two-Factor Security – Passkey logins use your private key stored on your device and your face or your fingerprint or your PIN. Unlike password, these cannot be easily replicated by a scammer.
I make music from the cries of physical abuse. Drummer.


We need Lex Murphy on the case.
The article is only referring to per device keys and passkeys that lock them on that device. In other words, someone would need to be able to get your device’s key, decrypt it or brute your passkey, spoof or steal your device somehow, and send the key under it’s identity. I’m sorry, but I don’t think the few people that could do that would be wasting their time to do it to little old you. For most people, their insignificance is the best security they have.