Discussion
Loading...

Post

  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Ricky Mondello
@rmondello@hachyderm.io  ·  activity timestamp last week

I gave an opening keynote at the FIDO Alliance’s “Authenticate” conference a few weeks ago! Although it featured timely strategies and tips for professionals deploying passkeys, my primary goal was to explain, as clearly as I can, why passkeys are important and how we should use them to reduce the harm that passwords cause.

YouTube link: https://www.youtube.com/watch?v=otObbUSxcqs

I’m really proud of this talk and I hope you’ll watch it and share it with others. I put care in to making it approachable while still delivering my perspective and insights to security professionals. If you don’t get the “why” behind passkeys, this talk will help fill that gap.

  • Copy link
  • Flag this post
  • Block
Graham Ballantyne
@gnb@mastodon.social replied  ·  activity timestamp 3 days ago

@rmondello I really enjoyed this talk! I work in IAM at a university and I would love to start introducing passkeys, but something I'm struggling with is that we have far more diverse use cases than a more vertically-integrated organization. Passkeys would work for our web-based SSO, which admittedly is the majority use case for us, but we also have places where a password is still needed (VPN, managed desktops, SSH, RDP, etc). Any advice for navigating that kind of environment?

  • Copy link
  • Flag this comment
  • Block
Colin Wheeler
@colin@mastodon.cocoasamurai.social replied  ·  activity timestamp 4 days ago

@rmondello Great Talk, as someone who’s been trying to adopt passkeys when services let me, I leaned a lot.

  • Copy link
  • Flag this comment
  • Block
Ali Shah
@ashah@mastodon.social replied  ·  activity timestamp 6 days ago

@rmondello This was communicated so well and easy to understand for someone not in the industry at all :)

Reminds me of that 2018 passwords con talk. Awesome stuff!

  • Copy link
  • Flag this comment
  • Block
AnneH
@annehargreaves@ioc.exchange replied  ·  activity timestamp 6 days ago

@rmondello Terrific talk, thanks!

  • Copy link
  • Flag this comment
  • Block
Jonathan Schofield
@urlyman@mastodon.social replied  ·  activity timestamp 6 days ago

@rmondello excellent. Thank you :)

  • Copy link
  • Flag this comment
  • Block
Matt Maddux
@matt@maddux.blog replied  ·  activity timestamp 7 days ago

@rmondello Ricky, THANK YOU for calling out the practice of just adding Passkeys as an option for MFA! It's always so frustrating to see it used in the worst way possible. I want to be able to switch all my accounts from using passwords + OTP to JUST PASSKEYS! Preferably removing the password and other factors from the account entirely.

  • Copy link
  • Flag this comment
  • Block
Bryan
@orange@hachyderm.io replied  ·  activity timestamp last week

@rmondello Great talk, Ricky! You succeeded in the approachable goal. I don't work on anything that can utilize passkeys but I've been enjoying them more and more as a user and look forward to their continued evolution and adoption.

  • Copy link
  • Flag this comment
  • Block
Kehvarl
@Kehvarl@furry.engineer replied  ·  activity timestamp last week

@rmondello
This sounds like a really interesting bit of information, the "why" behind passkeys is definitely a topic I want to understand. Do you have a transcript or a blog post about the topic? I would rather read an ruminate than listen to a keynote, sorry.

  • Copy link
  • Flag this comment
  • Block
Julian :rainbow_heart:
@Loredo@chaos.social replied  ·  activity timestamp last week

@rmondello great talk!

It leads to the obvious question how and when Apple is dropping the password and especially SMS 2FA for Apple Accounts. It seems to be a weak point when storing #Passkeys in the Apple Keychain. Unfortunately quite many processes are asking for a password still (without 2FA 😮) and using a Passkey for the Apple Account itself is missing.

I know you can’t comment, just to mention it… maybe it will increase some internal priority counters or something 🙃

  • Copy link
  • Flag this comment
  • Block
Brandon Butler
@brandonbutler@mastodon.social replied  ·  activity timestamp last week

@rmondello What’s your thoughts on sites that use passkeys + a second form of authentication? GitHub is one that comes to mind.

Doesn’t that defeat one of the benefits?

  • Copy link
  • Flag this comment
  • Block
Ricky Mondello
@rmondello@hachyderm.io replied  ·  activity timestamp last week

@brandonbutler I address this in the talk! Let me know what you think of my argument around this. :)

  • Copy link
  • Flag this comment
  • Block
Buccia
@BucciaBuccia@mastodon.social replied  ·  activity timestamp last week

@rmondello @brandonbutler If you have 2FA on Amazon and setup the passkey (only one), it asks the 2FA code after the passkey

  • Copy link
  • Flag this comment
  • Block
Bob Young
@fifonetworks@infosec.exchange replied  ·  activity timestamp last week

@rmondello
Ricky, that was an excellent talk. I'm glad I watched it.
I'm one of those people who still has serious reservations about adopting passkeys, and I was hoping you'd provide new information that changed my mind. My main reservation centers around the huge number of people who only have one device.
If their only device breaks, and
If they deleted the password authentication option,
Then they experience permanent account lockout.

I help people globally with tech support, including account recovery. I have a “no fix, no charge” guarantee. I’ve seen this problem first-hand. One device, broken or stolen, and accounts from
Microsoft,
Google,
Apple,
are gone forever.

You asked in your talk for collaboration and input, so here’s my recommendation: any adoption of passkeys, any implementation of passkeys, needs to include “error checking” that prevents a user from ever having only one way into an account.

  • Copy link
  • Flag this comment
  • Block
Christopher Bowers
@chrisipedia@mastodon.social replied  ·  activity timestamp last week

@rmondello maybe it’s the nerd in me but I’m hesitant to use passkeys because they seem so opaque to me. Do you have any advice that might cause me to step of the ledge?

  • Copy link
  • Flag this comment
  • Block
Rob
@rob@social.prosumer.dev replied  ·  activity timestamp last week

@rmondello Nice talk! Thanks for sharing.

Did you choose “Head over heels" as intro music yourself or was this chosen by the FIDO Alliance?

  • Copy link
  • Flag this comment
  • Block
Penguin
@PenguinToot@twit.social replied  ·  activity timestamp last week

@rmondello Great talk, thanks 🙂

  • Copy link
  • Flag this comment
  • Block
WTL
@WTL@mastodon.social replied  ·  activity timestamp last week

@rmondello <added to watchlist> 🎉

  • Copy link
  • Flag this comment
  • Block
Gracjan Nowak
@gracjan@mastodon.online replied  ·  activity timestamp last week

@rmondello It resonates with me what you said about actually allowing the user to drop the password. Some services allow that (PlayStation does it automatically), but at this stage most don’t yet. I’m happy that I can sign in to some accounts with a passkey, but the password is still there as a fallback, which I don’t need or want. This has further implications, in that I still need TOTP or SMS enabled to protect against password attacks, if a passkey isn’t asked for in that case.

  • Copy link
  • Flag this comment
  • Block
Dayton Lowell
@Daytonlowell@mastodon.social replied  ·  activity timestamp last week

@rmondello You're a really good public speaker, Ricky. You speak slowly, clearly, and communicate effectively. Great job!

I'm a web developer and I’d like to begin the investigation of supporting passkeys in our web apps. Do you have any good resources for what they might look like on the client & server?

  • Copy link
  • Flag this comment
  • Block
Log in

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.0 no JS en
Automatic federation enabled
  • Explore
  • About
  • Members
  • Code of Conduct
Home
Login