Hacker News new | past | comments | ask | show | jobs | submit login
Apple just showed us how it will kill the password forever (tomsguide.com)
30 points by RyanShook on Aug 3, 2022 | hide | past | favorite | 26 comments



It sounds convenient, but I can just anticipate a situation where I don't have access to iCloud and be unable to check my email on a different computer. Just two weeks ago, I attempted to create an iCloud account for a family member and it was disabled (they were using my mac) - maybe it looked suspicious - IDK. Point is, that apple was able to completely lock us out of iCloud with no recourse, not even a phone call, an email, or a warning. No thanks.


You do raise a good point - what if all your stuff - phone and laptop gets stolen? Can you still add new device to icloud without approval?


My wife has an iPhone and no other Apple devices. When that phone got bricked and she couldn't remember her iCloud password, she was completely out of luck. Available recovery mechanisms were SMS or having another Apple device. Calls to Apple went nowhere and provided no options to recover.

If that device was the one source of her access to all of the accounts she has, she would have been completely unable to do anything until purchasing a new phone and porting her phone number to that phone.


>Passkeys use Touch ID or Face ID for biometric verification

I was under the impression it was very poor security to use something like a face or fingerprint as a password... Okay for a username, but should be avoided at all costs for passwords.


There have been a few DEF CON talks about the security of biometrics but the most recent probably gives the best demos IMO.[1]

[1]: https://www.youtube.com/watch?v=hJ35ApLKpN4


Interesting but in the Apple case you'd need a cast of your intended victims face or finger to even attempt this attack.

It's easy to use a mask (or occlusion) to prevent a system from detecting your real face, but spoofing a specific person's face is a much bigger task. Any decent modern face rec system is going to use liveness detection as part of its analysis.


Yes for legal and practical reasons: you can be compelled to unlock biometrically and cannot change biometrics when the server side leaks.


At least for Apple's system, biometrics aren't used server-side. Biometrics are used to authenticate to the local system (e.g. your laptop or phone) and authorize use of a local private ECC key for further authentication to other services. The T2 secure enclave mediates all of this. The private ECC key never leaves the T2 chip. Biometric data is never stored unencrypted outside the T2, although like a password may be susceptible to capture when input. (The fingerprint scanner might be hooked up directly to the T2 chip, though, in which case attackers would need to resort to more direct methods for capturing fingerprints.)


Is the Apple key unchangeable or a one time key? Because if the former then it's still a problem once know publicly.


Do you mean the private ECC key? I don't know the specific details of the system, such as if or when a specific device key used for iCloud enrollment can be rotated. (I have no specific familiarity with Apple's iCloud or device management code, I'm just familiar with publicly known details of the T2, and also familiar with the macOS/iPhone Keychain APIs for generating and using T2 keys.)

But in case it wasn't clear: it's not an API key, but a public/private ECC P-256 key pair used for ECDSA signing. Apple only knows the public key (it doesn't much matter if the whole world knows the public key), whereas the private key never leaves the T2 chip. If any secrets have been exfiltrated from the T2 enclave there are bigger problems at hand, and generating a new key pair would be useless before fixing those problems.


The biometric authorizes the use of a key stored in secure enclave. The biometric is not used as a key.


It’s not using touch or Face ID as the password. That’s just to access your phone, and the proof of ownership of the private key is the “password”

If you prefer a pin or password to protect your phone you can use that instead.


I feel this article is not quite clear about the whole process. The secret which I take in this case is the private key is supposed to reside in your phone's trusted platform module and to be completely inaccessible nor stored on a server, however it is possible to synchronise your keys through iCloud ?

Also what happens when you flash a Qr Code, is Apple involved at any point (which makes it a pretty big spof) ? Can Apple add/revoke login authorisations for individual devices, and if so is there really a fundamental difference between this and an Apple SSO with biometric checks ?

From a naïve point of view it resembles Github/lab/tea SSH key-based authentication with extra steps, a us-based third party cloud provider involved and a new sheen of consummate proprietarism


It’s PKI replacing shared secrets, with a user friendly UX. For the 900 million active iPhone users in the world, it’s a net positive, not to mention the 3 billion Android users who will also benefit from this open standard (as Google has also committed to supporting passwordless FIDO2/WebAuthN).

Credential stuffing, weak passwords, password database leaks, all solved for with passkeys and leveraging existing smartphone ecosystem security mechanisms. Over time, your casual user might not even need a password manager anymore: your mobile OS is the password manager.


I would like to understand how this new system handles the following issues:

1. Sharing accounts. If I want to share a subscription to the Economist with my wife, say, I give her the username/password. Does the Apple/Google/MS alternative support multiple authorised identities?

2. Single point of compromise -- if the identity system or the phone is compromised, everything is compromised.

3. What if the biometric doesn't work, or the biometric sensing system doesn't work. Say my phone camera has just stopped working (which it coincidentally has, as I write this) ... does it freeze me out?


> 1. Sharing accounts. If I want to share a subscription to the Economist with my wife, say, I give her the username/password. Does the Apple/Google/MS alternative support multiple authorised identities?

Each registration and subscription is for the personal use of the Registered User or subscriber only. You may not share your log-in details or password with any other person. You may not share or transfer your subscription. https://www.economistgroup.com/terms-of-use

2. Most people already have a single point of compromise in their primary inbox, password manager, or browser storage. This doesn't solve the single point of compromise problem, and I'm not sure that any easy-to-use system could.

3. If the camera fails to recognise me currently when I use Apple Wallet, I am invited to enter a passcode. I'm not sure if this same fallback would be implemented, but I do see a photo which indicates that you can use an external security key instead of biometrics.


sounds great, if your end goal is to become further locked into using Apple devices forever.

Choose freedom. Embrace the green SMS bubble.


If the provider of the "green SMS bubble" stops selling data for a living, sure. I left Android a while ago for a reason. I loved Android; however, the privacy practices became too much for me to be comfortable with.


I mean I get it. I've read the GNU manifesto when it was fresh and nodded along.

But the adult thing is that 90% of the freedom to be had is outside of computers. The total calculus might very well give you more freedom if you go full Apple in 2022 compared to many of the other options.


I have chosen the freedom to get my objectives done and get on with my day. The Apple ecosystem is unrivaled in letting me do that, and I never see an ad or have my tracking data sold on a daily basis.


This is what they are actually implementing: https://fidoalliance.org/multi-device-fido-credentials/


Most exciting part is the third party support. If 1Password rolls this out, I’m fully on board.


It’s a real bummer that despite having TLS client certificates available for years, public key user authentication that actually gets traction is going to be proprietary nonsense.


This isn't "proprietary nonsense," it's a new open standard that is also be implemented by Google, Microsoft, and more: https://fidoalliance.org


Turns out putting a quality interface with convenience and ease of use in front of people matters. Problem is so much PKI infrastructure is built for businesses and sys admins.


There was never anything stopping browser devs from putting a quality UX on client certs.

FIDO seems to always require JS these days, too. Sucks that we're headed to a place where you won't even be able to log in without executing arbitrary server-provided code.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: