What is a Passkey?

  Рет қаралды 147,060

Ask Leo!

Ask Leo!

Күн бұрын

Пікірлер: 363
@askleonotenboom
@askleonotenboom Жыл бұрын
A more secure, more convenient alternative to passwords.
@debtfordwharf
@debtfordwharf Жыл бұрын
Hi Leo, back in the day, when CLI was a the only thing out there, PGP for email had caught on. I used to use a product called Eudora and similar email implementations. It seems like it took a while for this to come back in a different form. Better late than never.
@askleonotenboom
@askleonotenboom Жыл бұрын
@@debtfordwharf It never really went away. There was always a plugin for Thunderbird, and assorted others. The problem is it's still too complex for normal people to use.
@ranzali5564
@ranzali5564 Жыл бұрын
If someone adopts Passkeys, should they delete all other methods of authentication they used previously? For instance, Google Prompts? Could someone exploit/intercept Google Prompts if used at some point despite the fact that we set up Passkey?
@skverskk
@skverskk Жыл бұрын
Your explanation of pass keys is beyond excellent.
@berrywin
@berrywin Жыл бұрын
Exactly my thought to!
@markstevens2937
@markstevens2937 Жыл бұрын
super clear
@DarrelLanders-zf6kq
@DarrelLanders-zf6kq 7 ай бұрын
😮hjbfftttrr 0:33
@aaronloel5238
@aaronloel5238 7 ай бұрын
Mk NM😅
@brucebuckeye
@brucebuckeye Ай бұрын
Yes, wonderful job!
@ericpierce3660
@ericpierce3660 Жыл бұрын
You're so good at explaining things, it's like listening to my favorite professor.
@Manavetri
@Manavetri Жыл бұрын
One of the few on KZbin that really brilliantly transmits information. Simply incredible, makes me want to listen to you for hours
@dwightsmith5174
@dwightsmith5174 Ай бұрын
Sounds like an AI response! Have seen this same response on other videos.
@Back2SquareOne
@Back2SquareOne 6 ай бұрын
Passkeys are more secure than passwords because they are less "powerful". With an username/password pair you can potentially log in from any account, on any device, anywhere. Anyone who gets your username/password can potentially masquerade as you from anywhere. That is what makes them less secure / more dangerous. As described in the video, a given passkey is tied to a specific account and a specific device. It is important to remember that passkeys only authenticate the device and account. They do not authenticate the person. This is why the total security solution requires you keep access to the device secure. Fingerprint scanners, FaceID, or PINs HAVE to be used so that people who have physical access to your device, can't actually access your account. The device/operating system you use must, of course, provide a mechanism for securely operating a keystore. This was an excellent video.
@pyros4333
@pyros4333 2 ай бұрын
This is a naive point of view. Passkeys will be stored in raw form 100% it's impossible to guarantee biometrics on everything and syncable is a core requirement for an everyday user. Because of that you open the opportunity to steal the passkeys from a device guaranteeing that a successful attacker will have access to every. single. account. ever. forever. As you have correctly stated, you have moved away from authenticating people to authenticating just the device. This is an inherent risk introduction.
@FlagstaffChief
@FlagstaffChief Ай бұрын
Thanks. You explained a key point. The passkey is tied to/on the device, so if the device is unlocked, anyone who holds the device can access the account the passkey is associated with. It seems like an off-device password manager would be more secure, even though less convenient, a long as the account password is strong.
@rachelflamdesign
@rachelflamdesign 10 ай бұрын
Wow this was the clearest explanation I've found and finally understand!!! Thank you for this! 🙏🏻🙏🏻
@LeeRaymondCM
@LeeRaymondCM Ай бұрын
Thanks. This video is more than a year old and KZbin just shows it to me now. I had watched several videos about passkey because I heard that it's better. But it's only after watching yours that I truly understand how it works! Thank you!
@countorlock3148
@countorlock3148 5 ай бұрын
this is the clearest, most understandable explanation of what a passkey is on youtube, or anywhere else. and it also explains that apps are actually using passkeys when they allow us to login using our fingerprint, face, or pin. and also an added bonus on what are pgp keys. im so glad i watched this. thank you very much.
@sennlich
@sennlich 11 ай бұрын
here we are. I thought i i already knew how, but now i really got it. Thanks from a german Guy. Great work!!!
@MichaelWeston82
@MichaelWeston82 Жыл бұрын
Wow yeah, I second that. You have a very easy to understand way of explaining this!! Thanks so much. Every time I think I understand the encryption/decryption process, I seem to lose the understanding. This helped immensely.
@askleonotenboom
@askleonotenboom Жыл бұрын
Thank you!
@michaeljurwin
@michaeljurwin 6 ай бұрын
This is an amazing explanation. Thank you for making it so clear. I will be saving this video so that when anyone asks about passkeys, I will share this to them.
@dhlee627
@dhlee627 2 ай бұрын
Someone commented his explanation is beyond excellent - I agree and subscribed.
@skipmorgan
@skipmorgan Ай бұрын
I have watched you for years, back when you were on TV. I still love your teaching! Bless you
@Education-yk5ug
@Education-yk5ug 3 ай бұрын
This is a much better and clearer explanation than the one provided by Google. However: - at my last work place (a major corporation) using ssh keys was not allowed by Info Security group. According to them it violated their security standards. - if using passkeys prevents me from accessing my Google account from a device which doesn't have my passkey, then I have to use password, which defeats the purpose - if my passkey is automatically created on a new device, what if I'm using a public device and don't want my passkeys on it? - with passkeys I'm relying on a strong login security of my device, but if someone breaks in into my device, then they have green light to all my accounts
@askleonotenboom
@askleonotenboom 3 ай бұрын
1) your IT folks are misguided. :-) 2) We're moving to a passwordless future. In some cases you can choose that right now, in others you can simulate. So, no it does not defeat the purpose. 3) Passkeys will never be created without asking you first. 4) No. They'd still have to pass biometric or Windows Hello authentication when they attempt to use a passkey.
@clifforddicarlo9178
@clifforddicarlo9178 Ай бұрын
Best explanation of public/private key, asymmetric, cryptography I've heard.
@SreeOne
@SreeOne 10 ай бұрын
You are a great Teacher. Especially the core puzzle is untangled with those two KEY images word by word. Great Job Leo. Thank you.
@jeffhbayley9710
@jeffhbayley9710 10 ай бұрын
Super job Leo! Look forward to making it work...not instant.
@jackni41
@jackni41 Жыл бұрын
I've been using PGP keys for years and you have described it perfectly in this video!
@timothylinn
@timothylinn Ай бұрын
This is the best explanation of public and private keys and pass keys that I’ve ever seen. Thank you.
@cameronsnoek1716
@cameronsnoek1716 Жыл бұрын
Thanks!
@askleonotenboom
@askleonotenboom Жыл бұрын
thank you!
@snagglepu
@snagglepu 2 ай бұрын
Videos so great, speaks very well and slowly, like the words at the side, easy to understand
@roderashe
@roderashe 5 ай бұрын
I consider myself a pretty savvy techie. I’ve always understood, encryption and public key and private key stuff. But for passkeys, I have some sort of mental block. That being said, Leo‘s explanation of passkeys is by far the best I have ever heard!
@starterplanet
@starterplanet 4 ай бұрын
Agreed, & same here
@koncinar
@koncinar 2 ай бұрын
I think because all other explanations contain the "and then magic happens" part, this is the first one that explains that passkeys are just ssh-like authentication with a better UI.
@tomkrzemecki5166
@tomkrzemecki5166 25 күн бұрын
Thank you again for making a difficult concept EASY to understand.
@ericstromquist9458
@ericstromquist9458 Ай бұрын
Nice summary of public key cryptography!
@danehardinge8801
@danehardinge8801 Жыл бұрын
As ever Mr LN explains the inexplicable with ease. Been a follower for years - when internet connections required a series of morse-code-like noises and then went at speeds the common tortoise scoffed at
@brucebuckeye
@brucebuckeye Ай бұрын
Leo this is THE best video you have ever done! Not only very relavent, but very very well explained! Thank you!
@florakija
@florakija 11 ай бұрын
Best explanation on this topic. Thank you, sir!
@williampow9322
@williampow9322 3 ай бұрын
your explanations are so clear, far surpassing the many many other voices on this topic. Many thanks.
@stevejones8711
@stevejones8711 Ай бұрын
your channel has helped me so much, thanks for all you do
@notreallyme425
@notreallyme425 Жыл бұрын
9:01 this is where Steve Gibson’s SQRL protocol is superior to passkeys. Both use public key encryption, but SQRL has 1 identity that creates a key pair on the fly for each login based on the site’s domain name. Elliptic curve crypto allows you to create a private key based on a determined input. The same input will always create the same key. Therefore a secret (the identity) mixed with the domain name will create a unique key pair for each login. Since this is easily calculated, there’s no need to save it for each site, just keep the original secret (identity)and recalculate based on the domain. This means the protocol and any devices can have an unlimited number of sites to log into, no extra storage and it’s easily shared between devices. Oh well, we get passkeys instead.
@itssoaztek4592
@itssoaztek4592 Жыл бұрын
I guess there is no golden bullet in cryptography. Each solution has it's strengths and weaknesses, but what is considered a strength (or weakness) by one user might be the opposite for another user. Even though the passkey in it's current form is perhaps less elegant and definitely more cumbersome than the method you describe, I would still prefer the current solution. If I understand you correctly, I personally wouldn't like to have solution like SQRL that is based on a single private secret used to authenticate/unlock all (!) my accounts/logins. Sounds like the likelihood somebody would be able to crack my private secret in the future would increase with the number of accounts/logins and of course advances in technology with time.
@phillipp1399
@phillipp1399 Ай бұрын
It’s nifty but doesn’t scale the same. Passkeys are portable (once the standard is agreed upon) without exposing other logins/identities. Not only to other passkey safes, but to other individuals. The private key shared/transferred/stolen even if cracked, exposes nothing else.
@cjjuszczak
@cjjuszczak Жыл бұрын
Excellent explanation, thank you ! i needed a little extra help getting the basic premise after learning a bit about it :)
@cf9699
@cf9699 11 ай бұрын
What i like about things like this is that they are complicated for most users and this causes things to go wrong, so you end up dropping down to passwords and email to get back in to most accounts.This negates the purpose of it. you basically bypass by clicking on the "I forgot my password" link, this mostly ends up going back to unsecured emails.
@chyeong2518
@chyeong2518 6 ай бұрын
Leo, Thanks for sharing and explaining so clearly. you are a champion!
@mfr2
@mfr2 Жыл бұрын
Loved that XKCD reference!
@askleonotenboom
@askleonotenboom Жыл бұрын
Of course! And it's so easy to remember! 😀
@ZapsterZatoo
@ZapsterZatoo 24 күн бұрын
Thank you, for me it is the best passkey explanation yet.
@threeelancer
@threeelancer Ай бұрын
This was great. Thank you for explaining it without any frills.
@charleshoward1591
@charleshoward1591 Жыл бұрын
Outstanding - I subscribed immediately
@johnny-d8o8m
@johnny-d8o8m 8 ай бұрын
Have been following passkeys for a while but have never seen such a clear explanation. Congratz! Regarding passkeys i do have 2 concerns 1. Suppose i loose my device with the only private key i have, how will i be able to restore my account on a new device? 2. When creating a passkeys for an existing account, the less safe login method using a password which could be stolen from the server still exists. Hope some one can convince me that both issues can solved.
@askleonotenboom
@askleonotenboom 8 ай бұрын
When you set up a passkey on a new device, yes, you login some other way. It could be password, but it need not be. It's more often something more secure like a confirmation email sent to the email address of record, or a text message to the phone number of record, or similar. Once you've confirmed your identity that way, the passkey is created. Losing your device has nothing to do with any of that. ANY new device on which you want to set up a passkey goes through that process. If you lose your device, however, once you've signed in to the account elsewhere you can remotely disable the passkey associated with that account.
@cordovajose5693
@cordovajose5693 Жыл бұрын
In a passkey-only service, isn't there a higher than normal risk of getting blocked of your own account if you lose the devices the passkey is stored on?
@Fregmazors
@Fregmazors Жыл бұрын
If your operating system drive goes down, yeah. Or if for some other reason you can't access the computer with the private keys on it.
@starterplanet
@starterplanet 4 ай бұрын
Good question on a passkey only set up, but if you use 2 hardware passkeys (1 set as backup) do you think that solves that problem?
@Surimokoto
@Surimokoto Ай бұрын
@@Fregmazors Nice answer! Here is the end of "passkey magic". Who want to lose their google "only passkey" account along with a stolen smartphone?
@priscillalaflamme5768
@priscillalaflamme5768 Күн бұрын
Older person it's all word salad for a non technical person
@Kurtiscott
@Kurtiscott Жыл бұрын
Thank you for your thorough overview. Cheers!
@BlackLight--z
@BlackLight--z Ай бұрын
Awesome vid. Now I get what passkeys are. Windows does not overtyl explain it. Get quiet lost when setting up a new machine, or being asked to get a code from youtube on my iPhone. Now I get it all. Too bad you can't use it if you are not signed in to your PC with your windows account.
@spacewater5866
@spacewater5866 Жыл бұрын
"Or have a face" Beautifully done 😂
@thatspiritualhumane
@thatspiritualhumane Жыл бұрын
You explained in a detailed way. Passkey is still in infacy stage, I'm still waiting another 1-2 yrs..
@sooner_born2256
@sooner_born2256 Ай бұрын
Passkey is cool, thanks for explaining it. I wondered what was stored for that!
@toml9647
@toml9647 5 ай бұрын
Excellent discussion of the theory. Clarified a lot of questions I had.
@verymoonen6822
@verymoonen6822 Ай бұрын
I don't understand the better security other than no one being able to login from a different device. Getting access to the passkey device and using force (fingerprint, face-id) to unlock the device (against your will) will unlock everything. I prefer a local password manager with an local encrypted database. They can take my device but never force me to give my password for the manager or the hundreds of passwords for the internet. Besides that if the device is stolen of crashes I still have backup and can reinstall very quickly. Like the video thow. Nicely explained
@chazmazzing995
@chazmazzing995 26 күн бұрын
Thanks Leo great explanation on passkeys
@padmasreedevineni1116
@padmasreedevineni1116 Ай бұрын
The way u have explained is awesome thanks. I will see all ur videos
@kenjileach
@kenjileach Ай бұрын
Great explanation. I'm retired IT and keep getting prompted by google and amazon to set one up. It explains why I keep getting prompted to log into windows. I just say cancel and use the amazon password. Will need more info on pins and if they are like pwds and have to be updated. thanks.
@ChinaAl
@ChinaAl Ай бұрын
Wow! Finally explained in a way I can undestand. thank yo
@romanykemp9042
@romanykemp9042 3 ай бұрын
Leo, this was an absolutely superb presentation. I already had a decent understanding of private/public key pair but I knew nothing about passkey. I'm going to see how my very non-technical wife can follow your video now :-)
@jefffinn1105
@jefffinn1105 11 ай бұрын
Excellent & clearly spelled out...thanks!
@Unc1eMike
@Unc1eMike Жыл бұрын
Thank you! This is the best explanation of passkeys I've heard so far! One of my concerns regarding passkeys is... what happens when you have an account that's only using passkeys, have only setup passkeys for that account on a single device, and that device is lost, stolen, or is otherwise unavailable (it dies)? How do you regain access to that account? It seems like the best defense for such a situation is to have passkeys setup on multiple devices, allowing you to confirm you identity when setting up a new device after a device becomes unavailable, but that's not economically viable for some people. An alternative is to actually have a password for the service, using passkeys when possible, but that leaves the account vulnerable in the event of a data breach. Additionally, let's say I want to replace a functional device (my only device) with a new device. It seems I would need to maintain possession of that device for some "overlap period", during which I would need to login to every service I use on the new device, so that my new device can be authenticated by the old device. That seems rather cumbersome, but is probably a small price to pay for the added security of passkeys. What are your thoughts?
@askleonotenboom
@askleonotenboom Жыл бұрын
Each time you set up a passkey on a new machine a different form of authentication is used. For example a code to your phone, or a message to your email. Once set up it becomes your authentication mechanism. But you're always able to set it up from scratch somehow.
@BoiseTriathlete
@BoiseTriathlete Жыл бұрын
This is an excellent question and one that bothered me for a while. You can’t make the argument that you are in a better security position with passkeys if the use of passkeys is in addition to an authentication method that was already present. Therefore, you have only improved your security posture if you remove the old auth method and only use passkeys. However, if you do this, you run into the issue you are asking about. I think for this scenario is exactly why having a 3rd party password manager (PM) in general, and 1Password in particular, makes sense. The PM collects and manages all the passkey private keys so no matter what happens to the device that actually created them, it doesn’t matter. You get your new phone, authenticate to the PM, and you are back in business. But now isn’t the PM vulnerable? Not with 1Password’s security architecture. There are two necessary pieces of information to access the 1P vault that are never stored in the cloud or even transmitted: your password AND a locally generated random security key. You pair those things with a hardware security key, stored in multiple secure locations, and I think you have a setup that’s nearly impossible to breach, but is also convenient
@overtomanu123
@overtomanu123 10 ай бұрын
Well, I think passkeys are just a convenience mechanism in that you have to authenticate only once either in the key manager of your OS or in your password manager and then use the per device generated and stored passkeys to log in to the websites. No need to manage different passwords, and it also increases security as you are not exposing your password in your daily login routine. No chance of some man in the middle or some other malicious browser extension stealing your password. Now your concern about a data breach happening on the website on which you use the password to login, most of the companies don't store raw passwords in their databases. They store salted one way encrypted password. As soon as you supply the password and try to log in, it is immediately encrypted in the client side and transported to the server in an SSL tunnel ("s" in HTTPS indicates that the site uses SSL, which means all traffic is encrypted)
@markanderson2904
@markanderson2904 15 күн бұрын
@@overtomanu123 The supplied password is "immediately encrypted" on the server side. The client does not know how to encrypt the password.
@overtomanu123
@overtomanu123 12 күн бұрын
@@markanderson2904 yes I am telling that password along with all other traffic is encrypted by the SSL mechanism, so that MITM attack does not happen
@megapangolin1093
@megapangolin1093 Ай бұрын
Very helpful and comprehensive explanation of something that is used but not understood. Thanks, Leo, a simple concept, with complex technology, well explained. Seasons greetings to you and look forward to more pearls of wisdom in 2025.
@tigertiger1699
@tigertiger1699 Ай бұрын
🙏🙏🙏 I’m paying an IT pro to advise me.., a you have explained what he didn’t… I need a better IT guy..
@ModernCloudSolutions
@ModernCloudSolutions Жыл бұрын
This is an absolutely fantastic video - thank you!
@frequentlycynical642
@frequentlycynical642 25 күн бұрын
I can remember in the dark ages of the intertubes when all one needed is a few characters for a password. Mine was usually the same illogical six letters. Then banks and financial institutions wanted numbers, too. OK. Now we have many sites that have no need for extreme security insisting on upper case, lower case, numbers, special characters and a Hebrew litter. :) On top of all that, 2FA. Bang head here. In thirty years of extensive activities on the intertubes, I've had at most, a few incidences of security breeches, easily remedied. This Passkey stuff sounds awesome. Almost back to the future. Thanks for the video.
@cnaz8709
@cnaz8709 Ай бұрын
Thank you so much AskLeo
@njcanuck
@njcanuck 14 күн бұрын
This is is great, thank you! I was getting a screen on Google and had no idea about it. No explanation from them either. So if I'm on vacation and lose my phone. My laptop is at home. How do I authenticate on a new phone?
@askleonotenboom
@askleonotenboom 14 күн бұрын
Using whatever accout recover techniques or alternative sign-in techniques are available. PassKey is NEVER the ONLY way to sign it.
@kirkusarelius3365
@kirkusarelius3365 11 ай бұрын
Just found you. Outstanding succinct explanation thank You. Subbed of course
@Ko-Deckard
@Ko-Deckard Жыл бұрын
Great update Leo, Passkeys for Google Accounts are now available.
@askleonotenboom
@askleonotenboom Жыл бұрын
Pretty sure I mentioned that in the video, or at least the companion article. :-)
@MN-oy9dr
@MN-oy9dr Жыл бұрын
thnx. one question, what i missed explaind. say you have done so for your phone. all is working fine. you now get a new phone. do you have to start all over again on your new phone for every account (as where it a other device as you mentioned) , and then can without a problem get access to that account ? just wondering....thnx for the feedback
@askleonotenboom
@askleonotenboom Жыл бұрын
Depends on the system you're signing into. Worst case you start over, but in general it could be as simple as a one-time additional hoop to jump through (a text message to confirm, and email to respond to, or another device on which to approve the sign in).
@cmanho8879
@cmanho8879 Жыл бұрын
Excellent expositor! Thank you very very much.
@edcruz8820
@edcruz8820 11 ай бұрын
I saw this on my PlayStation account I have lost accounts before so I was looking for a different way to keep my account safe but I didn't understand it thank you for this video
@sxgroups
@sxgroups Ай бұрын
I have been using passkey with google sign in for sometime but with a bit of trepidation not really knowing how it works. This is the first time I get it. I never knew it’s based on private/public key cryptography. Thank you so much for this. I am now subscribed to your channel; that much you deserve. 😅
@sharvo6
@sharvo6 Жыл бұрын
Subscribed! Thanks!
@danielb8716
@danielb8716 Ай бұрын
Thank you Leo! This was very clear. I've been wondering about passkeys for awhile. I do have a doubt however. Does this not make our private computers one stop shopping for hackers? That is to say if they break into someone's machine they can get all the passkeys for all that person's accounts at once?
@toobvu
@toobvu Жыл бұрын
Thanks for your nice overview Leo. I’m interested in how third party password manager apps will help manage this information, versus the device operating system itself.
@HarshColby
@HarshColby Жыл бұрын
3rd party password apps aren't necessary. The key pairs are known only to your computer (the private key) and the site you're accessing (the public key). No password for 3rd party password apps to manage.
@bigjoegamer
@bigjoegamer Жыл бұрын
@@HarshColby Some online 3rd party password managers can store your private key. That's how they sync your passkey between all devices where the password manager works. Some of those online apps include 1Password and Bitwarden. KeepassXC is an offline password manager that will soon support passkeys, too.
@2kings3queens
@2kings3queens Жыл бұрын
I think you confused things a little with the "A & B" thing, Just call them what they are, Private & Public, just my 2 cents. Other than that thank you very much for the hard work
@AJBonnema
@AJBonnema 6 ай бұрын
Impressive video. If anything, the private key is the weak link. So I am left with the doubt that the private key is safe. I know that if one has possession of the hardware with linux the logon procedure is not going to be much of protection. The only protection I would trust in that case is both disk encryption and a logon password. And make sure to switch your computer off, or someone might add a password to the list of passwords for disk encryption (LUKS). However, even that has a shelf life as quantum computing is around the corner. Of course the whole encryption scene will change by that time. Anyway, I thank you for your explanation sir, very clear!
@stephenandracki3371
@stephenandracki3371 Ай бұрын
Very clear. Thank you
@cleantechnologies9125
@cleantechnologies9125 Жыл бұрын
Thank you for that explanation.
@viktorpaulsen627
@viktorpaulsen627 4 ай бұрын
Thanks. That was top notch.
@emchannel4160
@emchannel4160 10 ай бұрын
superb explanation of passkey done layman terms.
@franksitas2051
@franksitas2051 2 ай бұрын
Closet somebody reminds of Bob Ross, soothing and mesmerizing. And as a bonus you get educated.
@frederickclause2694
@frederickclause2694 Жыл бұрын
What happens if the machine with the passkey dies? How would you be able to access the account. I'm thinking here of things like cloud storage.
@askleonotenboom
@askleonotenboom Жыл бұрын
Each machine has it's own passkey. So you'd be starting over as outlined in the video/article by signing in some other way.
@frederickclause2694
@frederickclause2694 Жыл бұрын
@@askleonotenboom But if it's possible to sign in some other way doesn't that lower the level of security? I apologize for seeming dense but considering the skills of those with less than honorable intentions and the amount of information stored in the cloud this system may be an improvement on the current model but it still isn't perfect. I suppose anyone with these concerns could just have two machines with access then if one died you wouldn't be stuck. It will be interesting to see how it will all work out in the end. Thanks for your prompt reply.
@mfr2
@mfr2 Жыл бұрын
So, it should be strongly recommended to generate passkeys from more than one device for each account, inmediately after creation or activation of passkeys.
@askleonotenboom
@askleonotenboom Жыл бұрын
@@mfr2 Not necessarily. It depends on the service, but like I said, you probably signed up with an email address so an email to that address could also confirm you're you.
@askleonotenboom
@askleonotenboom Жыл бұрын
@@frederickclause2694 Of course it's not perfect. There's no such thing. But it is significantly more secure than password based authentication. AND it's easier to use. 🙂
@Jack_Callcott_AU
@Jack_Callcott_AU 11 ай бұрын
Gee, I finally know about passkeys. I was so curious about them. One problem, however: if someone breaks into your house, and if you are not there and your computer is turned on, they can just sit down at your computer and login anywhere, can they not? Maybe the operating system would ask them for a pin, or a fingerprint.....
@askleonotenboom
@askleonotenboom 11 ай бұрын
Exactly. The OS will ask for that.
@viktorpaulsen627
@viktorpaulsen627 4 ай бұрын
@@askleonotenboom Is this 2FA? Exactly how?
@askleonotenboom
@askleonotenboom 4 ай бұрын
@@viktorpaulsen627 Not really, no. It's closer to a plain old password replacement that's more secure. Kinda. Some think of it as 2FA because your device will prompt you for your PIN/fingerprint/face before providing a passkey, but that's still only one factor that you had to provide in the moment.
@markanderson2904
@markanderson2904 14 күн бұрын
@Jack_Callcott_AU: Always log off or, at least, lock your screen.
@michaelmccullough9668
@michaelmccullough9668 Жыл бұрын
Great video Leo. I can't wait for passkeys to take over the password phase. Do you have a list of services that have already started using passkeys, besides google?
@askleonotenboom
@askleonotenboom Жыл бұрын
www.passkeys.com/whos-using-it
@richardlanglois5183
@richardlanglois5183 6 ай бұрын
Very well explained!
@got_it_wrong
@got_it_wrong 3 ай бұрын
Great explanation. From a privacy perspective, I’ve always wondered about adding a fingerprint or face as a ‘passkey’. Is this stored anywhere that compromises one’s privacy?
@askleonotenboom
@askleonotenboom 3 ай бұрын
I don't believe so. It's stored and used only on the device.
@toml.8210
@toml.8210 8 ай бұрын
The public key would be like walking down a street and writing down the house numbers you see on mailboxes, but that won't unlock the deadbolt on the front door...
@william1183
@william1183 Ай бұрын
Since passkey is authenticated based on a specific device (e.g. android phone) associated with a specific account, if this specific device is lost or damaged and this account only uses a passkey, will the user of this specific account have anyway to recover the acess to this specific account?
@askleonotenboom
@askleonotenboom Ай бұрын
Recover access: of course. There's ALWAYS a way to login without a passkey -- that's how you set up a passkey in the first place. (That "way" is usually more convoluted, like responding to an email sent elsewhere, but secure.)
@steveworley1339
@steveworley1339 10 ай бұрын
Excellent explanation - thanks
@VanNguyen-bs5kw
@VanNguyen-bs5kw 6 ай бұрын
wonderfully explain. Thanks, Sir.💟💟🎀🎀
@fredscholl5250
@fredscholl5250 Жыл бұрын
Very good explanation
@alsjogren7890
@alsjogren7890 Жыл бұрын
Thank you. You described a software pair of keys. And Google does supply that. But, there are vendors selling hardware devices. I assume that using hardware PassKeys, the public key is identical on each of the web services that I use the hardware PassKey. When should I consider buying the hardware PassKey? Do most web services also require a password in addition to the PassKey?
@askleonotenboom
@askleonotenboom Жыл бұрын
I haven't seen hardware passkeys. Please don't confuse Yubikey devices with this. They are two-factor keys.
@ankitsanghi
@ankitsanghi Жыл бұрын
Actually if the yubikey can provide user verification via a pin, fingerprint, or something like that, it’s considered a passkey! Most people use them for 2SV, but they’re very much usable for passkeys (given they can perform user verification)
@itssoaztek4592
@itssoaztek4592 Жыл бұрын
@@askleonotenboom Yubikey 5 series can be used for passkey (FIDO2/Webauthn) authentication. Actually, that seems to be the only (simple) way currently to use passkey authentication on Linux (not Android) devices.
@capnsalty0200
@capnsalty0200 10 ай бұрын
Thanks this answers my questions.
@MrArdytube
@MrArdytube Ай бұрын
I have beem asked for a passkey several times. It has never been successful for me,
@hansm5566
@hansm5566 Жыл бұрын
Thanks! Great video.
@homandbackyard008
@homandbackyard008 Ай бұрын
Thanks Leo.
@kymyeoward306
@kymyeoward306 Ай бұрын
Is a passkey related to two-factor authentication - 2FA - which is now becoming very common for online payments in Australia, where I live. For example, if I log-in to my bank account, I will get an SMS on my smartphone, with a code which I must key into the bank’s log-in screen. 2FA is also being used by suppliers, when you pay a bill online. (PS We only have 4 major banks - ANZ CBA NAB and Westpac).
@askleonotenboom
@askleonotenboom Ай бұрын
Passkey is more a replacement for a password, and not directly related to 2FA.
@YTWAGNERM1
@YTWAGNERM1 8 ай бұрын
Very clear! Thanks!
@raviscal
@raviscal 9 ай бұрын
What if I have only one device storing my private key (say my phone) and I lost it. What is the recovery option here? and the person who was able to get my lost phone figured out the login pin? I am not questioning the security of passkey but trying to understand this scenario. In case of password, I know it and can use it from any device. By the way excellent explanation!
@askleonotenboom
@askleonotenboom 9 ай бұрын
There is ALWAYS another way to sign in. That other way may involve more steps and be less convenient (say, emailing you a code), but think about how you establish a passkey to begin with: you have to login somehow. Once you're logged in you can then revoke the passkey assigned to your phone.
@randypaddingtonmorton5195
@randypaddingtonmorton5195 3 күн бұрын
Once passkey is setup, does passkey replace two-factor authentication codes?
@askleonotenboom
@askleonotenboom 3 күн бұрын
No. It replaces passwords.
@russellman1281
@russellman1281 4 ай бұрын
What happens if you hard drive crashes? Will the passkey be on the backup. What if you have no backup. How do you get in the account?
@askleonotenboom
@askleonotenboom 4 ай бұрын
The same way you got into the account when you first setup a passkey on that machine. Usually a different, more cumbersome, authentication process, like an email to your email address with a code or something similar.
@stefan_becker
@stefan_becker Ай бұрын
It seems to me that there are some disadvantages too. Ultimately, you log in using your fingerprint or facial recognition. But a fingerprint is probably not much more secure than a password. It is possible to "steal" your fingerprint from, for example, a glass you are holding. This would not work with a password. I also think that if, for example, your smartphone breaks or is stolen, it will be a hassle to log in again. In that case, you will need your password again. This means that now you have two ways to log in (password and passkeys), but before there was only one way. I don't see why two ways to log in can be more secure than one way to log in, and I also don't see any way to get rid of a password, because you will always need it in case your passkey is lost.
@hotjamsm07
@hotjamsm07 Жыл бұрын
Now that TSA and flight security systems around the globe and immigrations check points are using fingerprint and facial identity, what could possibly go wrong? I would think that a pin number would be a better choice for the final authentication, while using these passkeys.
@Rednunzio
@Rednunzio Жыл бұрын
If I create the passkey on my device (smartphone) and a private key is generated based on data from my device and my biometric data, the only way to compromise a passkey-protected account would be to hack my password manager ? Or did I not understand well? The big difference is that I, the user, do not know my private key as I do for the password as it is a very long and complex alphanumeric string.
@David_F579
@David_F579 Жыл бұрын
Great explanation - thank u
@ezraaaa1
@ezraaaa1 Жыл бұрын
Fantastic explanation! Very clear. Been looking for a video that goes into more detail and this is exactly what I needed!
@ericbauer1937
@ericbauer1937 25 күн бұрын
CC; "That's pretty cool"
Passkeys And Disaster Planning
14:03
Ask Leo!
Рет қаралды 16 М.
When you have a very capricious child 😂😘👍
00:16
Like Asiya
Рет қаралды 18 МЛН
How to treat Acne💉
00:31
ISSEI / いっせい
Рет қаралды 108 МЛН
Une nouvelle voiture pour Noël 🥹
00:28
Nicocapone
Рет қаралды 9 МЛН
Passwords vs. Passkeys - FIDO Bites Back!
11:05
IBM Technology
Рет қаралды 59 М.
7 Cybersecurity Tips NOBODY Tells You (but are EASY to do)
13:49
All Things Secured
Рет қаралды 1,2 МЛН
How Can Passkeys Possibly Be Safe?
21:47
Ask Leo!
Рет қаралды 43 М.
Revealing the Hidden Spyware on Your Phone
27:26
Rob Braxman Tech
Рет қаралды 122 М.
It Was My Time to Reformat and Reinstall
25:40
Ask Leo!
Рет қаралды 22 М.
How Does a Hardware Security Key Like YubiKey Work?
11:17
Ask Leo!
Рет қаралды 47 М.
NEVER install these programs on your PC... EVER!!!
19:26
JayzTwoCents
Рет қаралды 4,9 МЛН
Broken PC? You won't believe what's causing this computer problem!
27:25
Airline Ticket Scam Exposed!
15:09
Pleasant Green
Рет қаралды 1,2 МЛН
When you have a very capricious child 😂😘👍
00:16
Like Asiya
Рет қаралды 18 МЛН