I personally am fine with this.

  • xhci@lemmy.ml
    link
    fedilink
    English
    arrow-up
    5
    ·
    11 months ago

    I foresee hardware tokens becoming more of a thing - also Passkeys (they’re so easy to use!). I do wonder if we’ll have more of a formal process to either backup or have “ownership” of our cloud accounts as they become even more intertwined with our lives.

    For example: iCloud Keychain is so easy to use, but what happens to your Passkeys if the account gets frozen? Currently, I don’t think there’s a way to extract the private keys (?).

    • NaN@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      2
      ·
      11 months ago

      If your account is frozen they should still be on the device. That would be a good time to change all your passkeys over to a yubikey, or to add one as a secondary token.

      The keys being locked in a Secure Enclave is generally considered a feature, not a bug. That passkeys sync at all is somewhat concerning. I wouldn’t expect them to be exportable any time soon.

      • argv_minus_one@beehaw.org
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        11 months ago

        The use of a “secure enclave” for any purpose is a bug at best, because secure enclaves aren’t just secure against your adversaries; they’re also secure against you. This is intolerable. All machines must obey their owner, and “secure enclaves” by design don’t.

        • NaN@lemmy.sdf.org
          link
          fedilink
          English
          arrow-up
          1
          ·
          11 months ago

          Hard disagree. That rules out yubikey, smart cards, and most any other credential storage systems.

      • xhci@lemmy.ml
        link
        fedilink
        English
        arrow-up
        1
        ·
        11 months ago

        How do Passkeys sync across devices on a single account?

        • NaN@lemmy.sdf.org
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          11 months ago

          Apple actually describes the process for sync in some detail: https://support.apple.com/guide/security/secure-keychain-syncing-sec0a319b35f/web

          Apple also describes the keychain recovery process in depth (I think this is when you’ve lost all devices?): https://support.apple.com/guide/security/escrow-security-for-icloud-keychain-sec3e341e75d/1/web/1

          The Secure Enclave can apparently return the private key. For most keys it is encrypted with a key pair that is permanently stored in the Secure Enclave. For synchronized keys it is apparently encrypted with a key that is also stored in iCloud in such a way that Apple themselves cannot get to it.

          It does sound like they could potentially enable exporting the passkeys, I think it’s unlikely they would because they provide a method to move them to other devices already and it does introduce more avenues for misuse. I don’t think it’s a huge requirement anyway, most hardware tokens provide no way to export at all by design. Apps that use them for 2FA should provide for enrolling multiple tokens.

          • xhci@lemmy.ml
            link
            fedilink
            English
            arrow-up
            1
            ·
            11 months ago

            Wow - thanks for this. It’s really interesting! I had a feeling they were exporting the key since Passkeys “magically” migrate from device to device. I’m sure it’s using some token that they would be very hard pressed to divulge.

            I guess this rules out exporting the token, but to everyone else’s point, I think it’s still possible to access your on-device Passkeys without an iCloud account.