Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

On the other hand, passkeys are almost exclusively used to authenticate to some service that can just as well be subpoenaed directly.

Exceptions do exist; two I can think of are passkey-based cryptocurrency wallets and the so-called "PRF extension" that allows using a passkey as a source of entropy for e.g. locally encrypting a password manager's database.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: