Re: Lose your device, lose your access
> You have 2 Yubikeys, you create passkeys on both.
Okkaaayyy, I have hundreds of accounts spread across decades of use, so having to double up on creating passkeys (1 for each device, so 2x#accounts) is a lot of onerous work,
> You lose one, you log in with the other, revoke the passkey on the lost one, and enrol a new passkey on a new Yubikey.
Excellent, do you have the complete list of all websites/services/accounts I've ever created an account on? I sure as hell don't for me to be able to go to them all and de-register the device.
> Or use two phones, or 2 Yubikeys, or something. Either way, it is a damn sight more secure than using a password.
Well, yes, but so is requiring physical attendance where appropriately cleared and vetted technicians and supply chain takes a sample of my blood and does an DNA anaylsis of it to to verify that the person who's physically shown up is the one who's DNA is stored on file - oh and that that file has never been tampered with and is the DNA record that was originally submitted. More secure != better, people have to be able to use it and actually want to use it.
And what happens if theres a fire at home so both the primary and secondary yubi-keys get burnt up? I guess you could have a fireproof safe for the secondary, but then you'd have to go digging it out all the time whenever you make a new account so you can use it and the primary to store the passkey. If you frequently have to retrieve it to register new accounts, you aren't going to want a time-consuming tumbler-lock safe, too much hassle. Maybe a safe that uses a key instead? Where are you going to store that key so someone doesn't just break in, find the key, unlock the safe and grab the yubikey? Maybe secure the safe with a passcode-type mechanism? Say it could work with a yubikey. Does this now mean you need a 3rd yubikey as you'll always want to have access to 2 to be able to unlick the safe to grab the 3rd - do you now use all 3 to create login credentials on every site?
> Oh and if you're using a Yubikey or phone you typically have to enter the PIN or use biometrics to unlock the key before any passkeys are available. So if you've lost it it's no use to anyone else either...
A rubber hose or phone book or, if the assailant doesn't care about being sublte, a bullet to the knee, can sort that problem (although, to be fair, that'd sort the problem of just getting a specific password out of the individual anyway).
Now don't get my wrong, I think 'passkeys' (or as I see them: ssh key-pairs but unique to each end-point rather than pushing out he same public key to multiple end-points) are a good idea and devices like yubi-keys etc. But they introduce their own complexities that are perfectly fine for someone like me - a sysadmin who's been using ssh public/private keys for decades so is perfectly familiar with the concept - but it could be an extra level of complexity for the average person. Ad my ssh-key use is mostly for work purposes, so I'm perfectly happy with work having copies of my private and public keys that I use for work puproses in terms of having them backed up, or being replicated to any host I login to automatically, or even a 'break-the-glass'-style system where cyber securty can invoke an emergency function that gives them access to all stored passwords in an emergency (with things like auditing where notices go out that this has happened and so-on) or another admin being able to login to a host and as root copy my new public key to my account and so on, But I don't have that type of admin-support mechanism at home with my personal accounts, such as account-based private key replication so that it's "just there" therefore I can't rely on that support for.
But I don't think passkeys and yubikeys will ever be a general solution for the general populace for security. Sure, for specific high-security populations (government employess for work, politicians, CEOs, really rich people, etc.) or for specific small-set high-security systems, like say bank accounts, but I don't see it ever being used for, for example, my TheRegister forums account, or random news commenting sites, etc. Hell, for those, password re-use is strong, because I honestly don't care if someone gets my credentials for a dozen forum/commenting sites, I prefer the convienience of being able to log into those sites in situations where it'd be onconvienient to use passkeys, e.g. my work computer. I have no way of getting personal passkeys onto my work computer easily (or legitmately, I'm sure I could get them on their if I tried by breaking all sorts of policies that could get me fired) , so while I can visit TheRegister from my work computer, unless I can remember and type in the password, I won't be able to login.