Hacker News new | past | comments | ask | show | jobs | submit login

> What it does is promotes further centralisation, because most users will use one of the big providers.

Because there are no easy non-centralised solutions (that works for Average Joe)?

Remember

Average Joe cannot

- backup keepass

- 3-2-1 backups using ZFS

BTW, if so many average Joe's lost google accounts then there would be outrage and great chaos (like ticketmaster etc). So some people lost Google accounts - true. Same some people list U2F key.

> the tech industry, including the tech press, n

Pragmatism will win.

This reminds me of IRC vs WhatsApp (or Signal). People want things to be simple.




> People want things to be simple.

As a reminder, if you ask what the best way is to back up a Yubikey, the advice is:

- Buy a second Yubikey

- Store it in a separate physical location, preferably within a fireproof safe

- Whenever you make a new account, set yourself a reminder to go get your second Yubikey, log in with the first Yubikey and then go through whatever process the site has (on a site-by-site basis without a consistent UI) and add the second Yubikey as another credential.

- Then go back to whatever secondary location you've chosen and put the second Yubikey back.

- And then repeat that process every single time you make a new account.

In contrast, dragging a KeePassXC vault into a Dropbox folder one time and just leaving it there and using it from Dropbox is incredibly simple and I feel like pretty much anyone is capable of doing that.


If you don't need a proper second factor, just set up TOTP and store it in KeePassXC. There is little benefit to a WebAuthn/FIFO "key" stored in your password manager over a password manager with your TOTP stored in it -- almost all of the benefits of WebAuthn (making phishing much harder) already exist with password managers that auto-fill.

There are usecases where you need proper multi-factor authentication, and in those cases you are either a professional (meaning you can handle backups yourself) or you're working for a large company where the management of the keys is done by IT and normal workers don't have to care about it.


I disagree that a proper key-based solution wouldn't have security benefits (auto-fill doesn't always work and is more vulnerable to phishing).

But I also really want to be clear here that we are not talking about multi-factor authentication in the long run. The explicit goal of Google/Microsoft/Apple is to get rid of passwords. Passkey is designed as a replacement for passwords. It's not a replacement right now, but that is the intention, they are not thinking about having a Yubikey as a second-factor for login.


When I said "auto-fill", I was referring to auto-fill with a browser extension where the website is checked. Yes, the FIDO method is even nicer from a technical perspective, but from a security perspective they are similar.

But of course, you can be phished into copying your password into a phishing site. So there are benefits, but it's not a huge difference in this one specific context (no physical token, using a password manager with a browser-extension-based auto-fill).


You are lucky if you find a mum with 3 kids or cafe owner or a fruit seller using TOTP in keepassXC. Do you know they would prefer a phone (not laptop/desktop)? They dont have laptop.


The HN article we are commenting on is about a PR to add a feature to KeePassXC.


> Buy a second Yubikey

I can (as a geek) but this is a problem for average Joe or a single mum with 2 kids.

This is the reason even banks or <your employer> incl. Federal places uses Cisco DUO not an opensource solution.

Most things are for average customer. passkeys are great

- Assuming a person keeps one password (either Apple or Google OK)

- Phishing for them is reduced

- No need to squeeze brain for was it username or email address (for login field)

- Most phones have fingerprint (even < $60 in developing world too with Android)

- Passkeys work from Android 9 onwards

- At the end some one needs to compromise.


- And they can't move ecosystems.

- And logging into your bank requires a proprietary device.

Let's be clear about what we're "compromising" about. If passkeys are going to be a replacement for passwords (and Google/Microsoft/Apple are very up-front about the fact that they want passkeys to be a replacement for passwords) they have to handle all of the use cases. But even if that wasn't the case and they could just target the general consumer, the downsides here are not just for techy people. The platform lock-in will absolutely affect ordinary people as well.

It'll mean that when your family member that doesn't know to make backups loses their iPhone, the only way to get those keys back will be to buy another iPhone.


> ecosystems

A majority don't. A majority use their phones/banks rather than analysing ecosystems.

> It'll mean that when your family member that doesn't know to make backups loses their iPhone, the only way to get those keys back will be to buy another iPhone.

That is acceptable solution. Buy and then move on with life. Everything will be back after your shell out $$ (android).

But with local will the family member send the hard disk or USB disk containing keys to recovery? Which recovery company? Will they be honest?

Whereas if you want to new phone - all works then easy.

People want simplicity. Really thats it.

(Again it may be sad for those that don't want to carry phone but the world is designed for average user).

BTW, why do you thing banks are using proprietary device.

Ask the HN -er to

- make it possible using U2F or TOTP keys (QR code)

- the same HN-user likes to implement flashy APP - so that they

- track, help whatever


> A majority don't. A majority use their phones/banks rather than analysing ecosystems.

Is this intended to be an argument for my point or against it?

The majority of people don't think about platform lock-in until it bites them, and money is tight and they can't afford to get an iPhone and then they sigh and buy one anyway because it's too annoying to switch.

> That is acceptable solution. Buy and then move on with life.

Like, you are laying out exactly how vendor lock-in happens, but your point seems to be that vendor lock-in is fine and we should just stop talking about it. "Yes, passkeys are vendor lock-in and I don't care" is maybe not as strong of an argument as you think it is? People like to be able to choose which phone they're going to buy.

----

> But with local will the family member send the hard disk or USB disk containing keys to recovery

No. They'll use Bitwarden or Dropbox and it'll be fine -- easier than setting up a new phone. They won't need to wonder if their new phone is compatible with anything, they won't need to wonder about whether their computer will work or not. It'll just work, immediately, as soon as their password app is installed.

Literally every single restoration/syncing option that's available for passkeys is also available for password databases, just as simple if not simpler. But you get an addition of a number of other simple solutions like:

- if you lose your phone and show up to a friend's house, you can type a password into a web browser and get all of your passwords back instantly.

- if you buy a windows computer and you have all of your passwords on an iPhone, you type a password into a web browser or an app and get all of your passwords back instantly.

None of that is supported with passkey.

Vendor lock-in does not make people's lives easier, it makes things more complicated. Do people really think that passkey is easier to back up than Bitwarden is?


I understand your argument from a philosphical or idealistic view. You are correct

People know Google/FAANG rather than bitwarden.

If your family knows bitwarden then kudos. I am living in a different world.

> Like, you are laying out exactly how vendor lock-in happens, but your point seems to be that vendor lock-in is fine and we should just stop talking about it. "

- We can talk about it

- And we are now.

- But people in power don't understand (or care).

There are no equivalent, easy option. I wish some company like proton mail or some one else would run a phone with all equivalent google services. But they don't.

> They'll use Bitwarden or Dropbox and it'll be fine -- easier than setting up a new phone.

Are you sure? People would ideally like

- Buy phone

- sign in google/apple account

- All apps installed and ready to consume/produce MEDIA

> Do people really think that passkey is easier to back up than Bitwarden is?

People think in different way. They know 2 things

- Google/Apple username + password

- get SMS recovery info (again I am not recommending - people are simplistic). May be you can replace this with some other option

- For example, facebook allows for nominating a friend or a facebook for recovery

- Enter the code

- ready to consume/produce MEDIA

> They won't need to wonder if their new phone is compatible with anything,

Average Joe has brand loyalty so that they will stay in whatever. Usually. If one goes to Samsung, they usually stay there - even if Pixel is better.

> They'll use Bitwarden or Dropbox and it'll be fine -- easier than setting up a new phone.

Where is the 2FA for dropbox or bitwarden? is that file supposed to be accessible without 2FA?

I agree to your no-vendor lockin sentiment but this means some one should invest and build a platform neutral + verifiable thing.

And even if some decent govt steps in people will claim it is all to track you. So EOF.


> There are no equivalent, easy option

Of course there is, the equivalent easy option is passkeys without vendor lock-in. Vendor lock-in does not make any of this easier or simpler.

Also note that current platform-offered password managers already allow syncing to new devices, so even for the people who are saying "I only want to use my Google account", syncing passwords through their Google account to Android is just as easy as using passkeys would be.

> Average Joe has brand loyalty so that they will stay in whatever. Usually. If one goes to Samsung, they usually stay there - even if Pixel is better.

This is just not true. I see people switch ecosystems all the time, and when they refuse to switch ecosystems, the reason they usually give is "it would be too annoying to port everything." Lock-in is something that affects ordinary people, I see this all the time.

> Where is the 2FA for dropbox or bitwarden? is that file supposed to be accessible without 2FA?

Weren't you just arguing for simplicity? The average user doesn't use 2FA. They should, but they don't because it's too complicated for them.

----

But this is silly, we've graduated from "people need a simple solution" to "any solution that involves anything other than a Google or iCloud account doesn't count as simple."

Which, sure, if your definition of simple is literally "the passwords stay in your Google account" then only putting keys in a Google account will do. But it's a pretty tautological definition.

And also a definition that doesn't hold up for ordinary users in my experience. People do actually understand that there are passwords for services other than Google and Microsoft because they interact with those systems today just fine. Pretty provably they can handle that level of complexity because that level of complexity is embedded in every single service that we use today.

But let's assume you're right. Even under that criteria, even if your definition of simplicity is "I sign in with an Apple/Google password and that's it, and it has to be specifically an Apple/Google password -- I want to re-emphasize that current password vaults with Google/Apple already handle this use case fine today just as simply as passkeys do, so there's still no extra simplicity or ease-of-use with passkey synchronization. At best, for those users it's as easy to sync a passkey as it would be to use a password manager. But password sync to new phones on log-in is already supported natively if you use the native built-in password managers (ie, the same password managers you'd be using for passkey).

Even under the most restrictive criteria with the least possible number of steps for syncing -- password vaults can be synced just as easily if not easier than passkeys can be.


If they buy another iPhone, how do they authenticate to the cloud account? A password that hasn’t been used in months or years? Standard credit collection agency data (which is stealable and has been stolen for many people already?)


Yes, correct. Apple documents its restore process here:

- https://support.apple.com/en-us/HT210217

- https://support.apple.com/en-us/HT204974

They also have account recovery processes which use metadata about you to try and verify your identity.

Note, this is the system they are using today for passkeys. So this is not some kind of compromise or complexity with password vaults that passkeys eliminate, it's just the universal process of account recovery that we have today with all of its flaws, and passkeys don't add any additional protections or simplicity on top of this system.


> At the end some one needs to compromise

Sure. Google and Meta and similar companies can compromise by having proper redressal processes which will hold up in court, should they lock your account.

Being an identity provider who can take away your identity with no legal recourse is not legally tenable and will be challenged legally.

If you’re an engineer working on this, expect to get beat up by the EU on this, to start with. There is a solution though — build import & export into the spec and actually implement it well.

Google actually has done a decent job with Google Takeout. It’s worth learning from.


The US Federal Government got rid of passwords in 2004. They use smart cards issued by approved issuers. They are certificate-based, so if you lose your card another one can be issued to you with the same properties on the certificate. Additionally, they usually escrow the Email Certificate private key.

I maintain some open source middleware for these cards [0].

[0] https://cackey.rkeene.org/


Having worked with the Federal government you are woefully misinformed. There likely is a policy statement announcing that passwords are being phased out, but I can assure they were alive and well past 2004.


There was a Presidential Directive signed by George W. Bush in August of 2004 [0] that resulted in follow-up actions by every department of the executive branch of the US Government, the creation of the physical infrastructure, annual reports on compliance.

As someone who has worked with the DOD OCIO on this, I am likely significantly more informed than you and the assertion to the contrary is unfounded and likely incorrect.

https://www.dhs.gov/homeland-security-presidential-directive...


The word 'password' does not even appear in the document you linked.


... do you think that's the only way it applies ? Did you read it ?

It says that no other method of authentication to US Government (exempting specifically national security systems) except for the approved method may be used. Since there are no passwords in the list of strong authenticators, it's not permitted.

Here are the relevant sections pieced together so you can't miss it:

Note "Mandatory"

> establishing a mandatory, Government-wide standard for secure and > reliable forms of identification issued by the Federal Government > to its employees and contractors (including contractor employees)

Note that the definition of the phrase used above excludes passwords:

> "Secure and reliable forms of identification" for purposes of this > directive means identification that (a) ...; (b) is strongly resistant > to identity fraud, tampering, counterfeiting, and terrorist exploitation;

This is the part that says they have 8 months after the August publication of HSPD-12 to comply with the above, and specifically for US Government computers (called Information Systems).

> As promptly as possible, but in no case later than 8 months after the > date of promulgation of the Standard, the heads of executive departments > and agencies shall, to the maximum extent practicable, require the use > of identification by Federal employees and contractors that meets the Standard > in gaining [...] logical access to Federally controlled information systems. > Departments and agencies shall implement this directive in a manner > consistent with ongoing Government-wide activities, policies and > guidance issued by OMB, which shall ensure compliance.

So, upon... actually reading HSPD-12 there's no interpretation that can be made where passwords are permitted to access unclassified systems... aka, my original statement.

You are wrong.


> BTW, if so many average Joe's lost google accounts then there would be outrage and great chaos (like ticketmaster etc). So some people lost Google accounts - true. Same some people list U2F key.

They don’t “lose” Google accounts or Meta accounts or whatever. They’re locked out. In many cases, it appears lockouts can be triggered even by external events, including bad actors. Most companies are famously opaque on how lockouts happen, but there’s enough affected users out there to start forming some hypotheses.

Your argument is that the failure rate is so small, it doesn’t matter. “We’ll worry about it when the failure rate increases.”

This is what lack of accountability looks like, because you’re completely oblivious to the human consequences of even one failure.

Organisationally, companies like Google or Meta want billions of users, and want to manage the keys to their users’ digital universe, but don’t want to put in decent redressal processes for when things go wrong.

It’s not a tenable situation. Either the public will need to reevaluate how much they can trust big providers, or big providers might find legislation or legal action directing them to do better.


Ticketmaster outrage has exactly the same effect as complaints against Google.

Average Joe has no idea whatsoever how to complain and get noticed. That's like saying "If shoplifting were so common there would be police in every store." Nope, it's just the cost of doing business.

Cloud backup works for average users. That includes keypass. Heck, even HN users do it that way. The only difference is that we have 16 word DiceWare passwords and key files on YubiKey devices.

The scariest problem to me isn't centralization, it's a lack of recourse when things go wrong.


> tcketmaster

IIRC, nothing changed.

Take for example practices of PayPal or VISA etc. Nothing changed.

> Cloud backup works for average users. That includes keypass. Heck, even HN users do it that way. The only difference is that we have 16 word DiceWare passwords and key files on YubiKey devices.

Sorry most HN users are the ones building closed systems.

Sure, they work in FAANG for 10 years - get enough $$$M then sure complain things are NOT open.

> it's a lack of recourse when things go wrong.

but does it happen outside of banking etc. Most average Joe does not keep 10 year old email like a geek. They keep moving on.

I am a 20 year veteran of linux user. Sadly and frustratingly

- There is no easy open solution for google drive or docs

- Dont ask average Joe to do hosting/nextcloud etc

- I wish some one like FSF, Linux foundatation built some products that are usable (like firefox phone). Even during firefox phone sales, I found most of the EU devs were using for their daily use iPhone or expensive Samsung Galaxy. It is ridiculous to tell others to use 512MB or 1GB firefox phone when they used state of art

- Even recently I wanted to implement something like Codeberg at a large University. No help from their side.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: