back to article Microsoft won't let customers opt out of passkey push

Microsoft last week lauded the success of its efforts to convince customers to use passkeys instead of passwords, without actually quantifying that success. The software megalith credits passkey adoption to its enrolment user experience, or UX, which owes its unspecified uptake to unavoidable passkey solicitations – sometimes …

  1. Paul Crawford Silver badge

    There are also potential problems if the user loses access to a device that stores passkeys – another means of authenticating to a passkey-linked service would be required, which might involve passwords or a more involved recovery process.

    And therein lies the practical pain in supporting anyone using them, and the easy route to compromise. True, it is not as easy as folks who use "qwerty" or similar as their password, and it avoids the password reuse problem, but it puts everything in a given device's internal store for better or worse.

    1. Steve Davies 3 Silver badge

      Putting all your eggs

      into one basket

      Then Dropping it... (because of the non opt-out crap)

      MS is working hard to piss all its customers off (so that the give MS the finger)

      It is almost as if they have been studying the "Rise and Fall of Gerald Ratner".

      That didn't end well for him.

      1. Doctor Syntax Silver badge

        Re: Putting all your eggs

        And yet...a friend who doesn't use MS Office decided that signing up for a subscription was an acceptable cost to get rid of the ads. There seem to be no limits to the amount of abuse their customers will accept.

    2. MachDiamond Silver badge

      "and it avoids the password reuse problem,"

      reusing a password isn't a problem. Reusing passwords improperly is a problem. I'd never use my password here on El Reg at my bank, nor my email/web server/FTP, but I use it in a few other places. I do have a password generator/manager for things that require a very strong password, but I don't carry that around with me everywhere so it's much easier to remember a few passwords that I might need when I'm out and about.

      1. Neil Barnes Silver badge

        Quite. And add to that the huge number of places that _require_ a password for a login which is both unnecessary and pointless...

      2. NoneSuch Silver badge
        Big Brother

        "Passkeys rely on public key cryptography. When a user elects to create a passkey – or does so just to make the solicitations stop – a private key is created. That key gets stored securely on a device (such as a PC or a phone), where it's associated with the device's unlock mechanism (a biometric signal or a PIN). The corresponding public key is stored on the server for the associated application."

        Except with a regular password, I can still sign into my work PC if I accidently leave my phone at home. Passkey, not so much.

        Am sure the NSA is behind the "please put your access key on your (insecure) phone" policy.

        1. Mike007 Silver badge

          Passkeys are for logging in to services, not devices.

          If there is a website that you are regularly logging in to from your (presumably trusted?) work computer, create a second passkey on that device?

    3. DS999 Silver badge

      That's not a problem with passkeys

      It is a problem common to ALL authentication schemes. In order to avoid being totally user hostile, there has to be some "backup" method of authentication if you forget your password, lose access to your passkey, lose your hardware token, change your phone number (if you're using SMS based 2FA) and so on.

      The typical reliance on "security questions" which are almost always far more easily guessable/learnable passwords leaves a gaping hole no matter how good your security is on the primary authentication method. The more pick-proof you make your front door, the more that thieves will decide it is easier to get in via the 2nd story window you've left unlocked to have a way in for when you lose your house key.

      There are ways to move passkeys between devices, Apple can manage them via iCloud for example - but they are only copied between devices if the user has set the "advanced protection" mode for iCloud which encrypts everything with a user supplied encryption key. That's very secure, but then you have potential recovery issues for that user supplied key so you're just pushing the problem up one level. Apple has solutions for that too, but at some point every solution depends on the user taking some ownership in being able to recover their access if a device is lost/stolen, passwords/encryption keys are lost/forgotten, and so forth.

      I'm not sure it is possible to create an authentication method that is both secure from remote exploit, and trivially recoverable for the typical non-technical end user without re-opening the door for remote exploit. The only exception is within a smaller security domain - like if you lose access to your university resources if they have a way you can go to a physical office and present your official ID they can get back your lost access without opening things up to remote attack. But in a general sense for an "internet user" I don't think it is possible to have both security against remote attack and ease of restoration if you lose access.

      1. eldakka

        Re: That's not a problem with passkeys

        > The only exception is within a smaller security domain - like if you lose access to your university resources if they have a way you can go to a physical office and present your official ID they can get back your lost access without opening things up to remote attack.

        I think that's sorta the point, they want to become that single security domain for you and tie you into their system. They want you to use their, and only their, services for that single security domain. Passkeys are an enabler of lock-in.

        1. DS999 Silver badge

          Re: That's not a problem with passkeys

          If they wanted that they wouldn't have agreed upon a single standard they all use. There is already some interoperability between the various players, it will take time to iron out the details but no one is going to be locked into iOS or Android or Windows by passkeys.

        2. Mike007 Silver badge

          Re: That's not a problem with passkeys

          Passkeys have nothing to do with anyone except the device you are using and the service you are authenticating with.

          Microsoft/Google/Apple/whoever have no involvement at all in me using a passkey to log in to my website. Or when you use a passkey to log in to my website.

          The only thing those companies do is provide a built in default password manager for people who don't already have one. Of course that doesn't have the same functionality for moving between devices as a proper password manager, but it is for users who would be saving their passwords on a single device anyway!

      2. Anonymous Coward
        Anonymous Coward

        Re: google

        Lose you're PAYG [prepaid] phone, you're done. Absolutely no way to regain access to your account.

        1. cmdrklarg

          Re: google

          **** Lose your PAYG [prepaid] phone, you're done.

          FTFY

          Just remember:

          You're = You are

          If the sentence doesn't sound right using "you are", use "your".

          TMYK!

        2. Ian Johnston Silver badge

          Re: google

          A friend of mine has a Hive account for her flat's heating system. It can only be remotely controlled by app, but she can't log in because it insists on sending a text message to the phone number she gave when she bought the thing. Which is a landline number, now VOIP, and cannot accept text messages in any way. To change her registered phone number she has to login ...

      3. bazza Silver badge

        Re: That's not a problem with passkeys

        The ability to safely transfer security assets such as PassKeys from one device to another seems to me to be an essential component of any security management tool. What's irritated me about things like the popular OTP apps on smartphones is that - basically - you cannot do so. You have to rely on the OS and back end cloud backing up your device and restoring to another. That's not fine, because then you're locked in.

        So it seems pointless building PassKeys into an operating system as core functionality, because that's simply going to make life for users extremely difficult at some point in their lives. Unless there is also a standardised means of transferring PassKeys around devices that all can agree to and is also safe, the software vendors should not be allowed to build them in to their OSes. It becomes another form of device lock in.

        KeePass and its derivatives is the best for storing security assets, simply because one can then move one's KeePass file from device to PC to Mac, etc.

        1. BaritoneGuy

          Re: That's not a problem with passkeys

          I have some passkeys in Bitwarden and have been able to use them from multiple devices. Not all services work with that though. MS is an example.

          1. Mike007 Silver badge

            Re: That's not a problem with passkeys

            The biggest companies are the ONLY ones fucking shit up. They are deliberately over complicating things and doing things "their own way" for the sake of it, instead of just doing things the same way as everyone who isn't Microsoft/Apple/Google!

      4. Andrew Scott Bronze badge

        Re: That's not a problem with passkeys

        Once was able to use a "password hint" on an imac to find the users password. user had died and the machine belonged to the college which needed access to some data. Probably wouldn't have mattered as the drive wasn't encrypted, so there were other way to get the information if necessary.

  2. DMcDonnell

    One ring to rule them all.

    "One Ring to rule them all, One Ring to find them, One Ring to bring them all and in the darkness bind them.", JRR T.

    1. Mentat74
      Coat

      Re: One ring to rule them all.

      Don't you mean : "One passkey to rule them all"...

    2. MrDamage

      Re: One ring to rule them all.

      Someone mention onion rings? No? Dammit.

      1. Anonymous Coward
        Anonymous Coward

        Re: One ring to rule them all.

        Good idea, got some in the freezer, forgotten them. Will have with lunch today. :-)

    3. Anonymous Coward
      Anonymous Coward

      Re: One ring to rule them all.

      One device to lose and lock you out.

  3. Lost in Cyberspace

    Better security doesn't just stop the scammers

    As I've found out, when trying to help end users, the extra security doesn't just inconvenience the hackers and scammers.

    It often prevents the rightful owner from getting in, when things go wrong. I've had a few customers completely lose access to dozens of services.

    One had their Android phone stolen and they got locked out of their Google account (and the associated saved passwords, passkeys). Google won't let you speak to a real person.

    Another had their Microsoft Account hacked (and email address changed). They lost access to their Authenticator app, OneDrive files, 365 apps, Windows Store purchases, email, LinkedIn and Facebook. The hacker relied on the fact that Microsoft are completely useless at restoring the account to the original owner - even a real person just sends you back to a recovery form, which won't work because we don't know the email address and it doesn't ask for anything else to identify the account.

    As for Facebook? Again, once an account gets disabled all the recovery options stop working too. And good luck getting a real person to help.

    1. Anonymous Coward
      Anonymous Coward

      Re: Better security doesn't just stop the scammers

      @Lost in Cyberspace - you saved me from typing a reply. So I'll just say "ditto". Microsoft and the other big companies just don't live in the RealWorld™. I've also seen all of the items you describe. It is not unusual.

      Some how Microsoft assume that RealLife™ does not happen to people. Account loss now is way more extreme due to what is locked up inside it.

      And the absolute worse part is that inability to talk to a human to prove the account has been stolen. I guess they don't have any cash left in the profits to pay people. (Or worse, the AI responses sending you in circles)

      Instead just have to sit and watch the scammer have full run of everything.

      Just a simple check like looking at the location where the new logins are coming from would be enough to prove the theft...

      1. Anonymous Coward
        Anonymous Coward

        Re: Better security doesn't just stop the scammers

        "Microsoft and the other big companies just don't live in the RealWorld™. "

        I see this all the time, companies know how things should work and be used, but rarely know how things *actually* work and are (mis) used.

        It's a regular pain in the arse because I often find myself mopping up after the the dev teams and even feeding back experience based suggestions based on those real world issues which trip users up are ignored because it doesn't fit their ideals or "look messy" on their slick "one pagers" which do little other than confuse users more.

    2. DS999 Silver badge

      Re: Better security doesn't just stop the scammers

      There are ways around that, but they require an informed and minimally technically competent end user. I'm sure Google and Microsoft both have a way to get back into your account if you've lost your access, but it would require some sort of action by the end user to prepare for that and will be its nature either be complex or leave gaping holes in security.

      On my iPhone for instance I have a couple passkeys (not doing anything useful they were just creating because I wanted to know how it worked) but if I lose my iPhone and get another I'll get access to those passkeys. That's because they are getting backed up to iCloud - which for security critical stuff like passkeys only happens if you have set "advanced protection" mode for iCloud, which is not the default. That encrypts your iCloud backup with a key you provide - and puts the onus on you to do something about protecting your access to that key (that's why this mode is not the default)

      Apple has two ways of getting back your access to your iCloud encryption key. There's a way you can create a "recovery key" which you can use to restore that access. The other option is you can set up "recovery contacts" which are trusted people who can provide that recovery key to you. I'm not sure of the exact details of how that process works, I saved a copy of that recovery key when I set it up in my safe. But I suppose if someone broke in and stole both my phone and my safe I'd be screwed - if I wanted to protect against that I'd have to store another copy of that recovery key elsewhere like a safe deposit box.

      All this is to say that while it is possible to recover your lost access in a secure way, it is not something easy nor should we expect casual users to understand it at all. That's why advanced protection is not the default on the iPhone, but users may assume their passkeys are getting backed up in iCloud and be rudely surprised when they learn otherwise.

      1. Anonymous Coward
        Anonymous Coward

        Re: Better security doesn't just stop the scammers

        You've missed the point. You are intelligent and technically savvy. The average user is not. I had someone last week who lost a 35 year old Hotmail account to a scammer. Her contact mobile was out of date. Her alternate email was an old long gone ISP account. And there is no human to talk to use common sense to fix this. Gone to a scammer. Along with all those emails to her long dead sister. Poor woman in total tears but literally nothing we could do.

        Average home users don't know how important this extra data is until they loose access to the account. And then you get what you pay for on the support side...

        Apple is better if you own two Apple devices. And of course all Apple disciples have a Mac, an iPhone and an iPad so they are fine to reset passwords and security details.

        But try doing this with an old iPhone and a PC linked to a long forgotten email account... The system is designed around a perfect person who ticks all the boxes and sets all the recovery options. Not the average home user who have never had to worry before. Loose that iPhone and there is then no one to talk to to fix it. Just an automated response needing you to check an email account you now don't own.

        1. Anonymous Coward
          Anonymous Coward

          Re: Better security doesn't just stop the scammers

          Another example. Old man in his 70s. Laptop dies due to a cup of tea dropped on it.

          Try to access Hotmail account. Password was saved in the old chrome web browser. It now needs to send a confirmation email to his Gmail account. And to login to that it needs to send confirmation to his Hotmail account... Alternative is to send an SMS to his landline. Which, for some reason, is not happening from either account even though UK landlines can take SMS...

          Both accounts lost due to the old guy knowing that the laptop just remembered this stuff for him. This will be worse if the laptop is the passkey to access everything. All accounts lost due to a spillage of a cup of tea.

          Attempts to recover either account lost in a dead end of automation. The Hotmail recovery relies on "last emails received". Even though that could be reconstructed through friends... no doubt it failed due to all the spam in the mailbox.

          Yeah - don't be old and rely on technology.

          1. LBJsPNS

            Re: Better security doesn't just stop the scammers

            "don't be old and rely on technology."

            70 year old here. Piss off.

          2. ITS Retired

            Re: Better security doesn't just stop the scammers

            80 years here. Linux, Apple, windows, 2 hand built web sites...

            1. Andrew Scott Bronze badge

              Re: Better security doesn't just stop the scammers

              been there done that but only 73. still working.

          3. sabroni Silver badge
            WTF?

            Re: Yeah - don't be old and rely on technology.

            If you're under 70 spilling a cup of tea doesn't break laptops? What the fuck are you talking about?

        2. Anonymous Coward
          Anonymous Coward

          Re: Better security doesn't just stop the scammers

          "I had someone last week who lost a 35 year old Hotmail account to a scammer"

          35 year old Hotmail account eh? That's impressive, especially as Hotmail was launched in July 1996 - only 28 years ago

          1. Richard 12 Silver badge
            FAIL

            Re: Better security doesn't just stop the scammers

            So he misremembered when he got the account by a few years.

            The point stands. This wasn't a throwaway account opened yesterday - it mattered.

            1. Anonymous Coward
              Anonymous Coward

              Re: Better security doesn't just stop the scammers

              I blame the client for the maths. She said she had "had the mailbox since she was 17 years old" and then said she was in her 50s. Maybe that was "almost 50s" and I did some bad maths...

              Still tears from the loss of her sister's messages for ever. Normal people never think it will happen to them. And with Passkeys this would also have been everything else lost at same time and not just the amazon account which she lost that same day.

              What confuses me is how "One passkey to rule them all" is better than multiple passwords backed up with 2FA.

              1. Anonymous Coward
                Anonymous Coward

                Re: how "One passkey to rule them all" is better than multiple passwords backed up with 2FA.

                Umm, now this is tricky so bear with me, see if you can grok it.

                The advantage is no passwords to remember.

                Why are you even in this conversation when you haven't even understood the basics?

        3. DS999 Silver badge

          Re: Better security doesn't just stop the scammers

          How have I missed the point? I said that the failing is that if they make recovery secure it will be difficult for the "average user" to understand or deal with. That's ALREADY the case with all current authentication schemes. Or did you think that even if you could convince an "average user" to use a yubikey or similar device (yeah, fat chance) that recovering from the loss of that device is going to be trivial for them to handle? Of course it won't. Its the same problem NO MATTER WHAT YOUR PRIMARY AUTHENTICATION SCHEME IS.

          Today the situation is everyone is using passwords, and the recovery method for passwords is ... more passwords! (They call them security questions, they are just much less secure passwords than the 8 letters+numbers+specials that web sites force on you today) If you want to make it simple for "average users" that's really the only way, unless someone institutes some system of physical "branches" where you can prove your identity to recover passwords/passkeys/whatever like going to your local bank or to a Walmart service counter. I mean, that's theoretically doable, but not remotely practical in the real world. So we're left with either very insecure security question type recovery, or very secure methods of recovery like what iOS does that unfortunately has no choice but to come with a high bar for understanding how it works and what you need to have done BEFORE you lose your access.

          There's nothing inherent in passkeys that requires a difficult recovery system. They could be backed up in the cloud somewhere and you visit a site and answer your recovery questions like the name of your first pet and the name of your third grade teacher and you get back access. Yes that destroys a lot of (but not all) the value of passkeys but if you want something that's as easy for the average user to recover from that's unfortunately the best we've got for now.

          1. Anonymous Coward
            Anonymous Coward

            Re: Better security doesn't just stop the scammers

            > I said that the failing is that if they make recovery secure it will be difficult for the "average user" to understand or deal with.

            Currently the "recovery" is a problem for non-technical average users like your Mum because they have had multiple mobile phones and email accounts since they were nagged for that data years ago. And any attempt at trying to recover is hit by a dead end dumb script and zero ability to put a human on the case to check what the scammer is clearly doing in the account.

            It would take five mins to spot that the logins are now from a new location, the inbox is full of "password reset" messages, and the sent folder has loads of emails going out asking for money from people in the address book.

            One human with half a brain could take five minutes to recognise that pattern and let the original owner use a sensible method to reclaim the account.

            The Passkeys will not help here. They will hinder. If the passkey is a phone or laptop that has been stolen now the scammer has access to way more accounts than before. Meanwhile the real owner cannot login on a secondary device to attempt to stop this by changing passwords like they could do today.

        4. MrBanana

          Re: Better security doesn't just stop the scammers

          I've just been bitten by Apple ID security. I had a MacBook forced on me by corporate, so I needed an Apple ID. Created once, and I kept all the information I was told I must keep: user id (corporate email), password, answers to 3 security questions, an iCloud PIN, and a recovery key. Used it one more time when that MacBook died, and I was given another. I had reason to use Aplle ID this week and find that a 2 factor scheme is now in use, requiring me to authenticate with my other device. I have no other device. "Don't worry if you don't have the device anymore, just enter its number, ending in 09, and we will start a recovery process", they said. I have no device that ends with 09. I have no idea what that number might be, Apple cannot tell me. I can keep sending verification messages to it but they are just annoying someone else, and not helping me access my account. I can log into iCloud with my username and password, but the only thing I can do is see the old MacBook as the only device that I have. Not my current one, and no other device.

          Without knowing what that number ending in 09 is, I have no way of adding a real device or recovering the account. Apple claim I must have entered the number for a device and then verified that the device was active. Nope. Never had a number ending in 09. Fortunately I have nothing of interest to me associated with that ID, I can just create another one. Unfortunately the hardware and Apple ID is intrinsically tied to my corporate ID, and no one can tell what will happen if I have to change that. I suspect "bad things".

          1. MacGuffin

            Re: Better security doesn't just stop the scammers

            I cannot rely on Apple ID.

            Apple ID does not exist anymore.

            It is now Apple Account.

    3. Locomotion69 Bronze badge

      Re: Better security doesn't just stop the scammers

      Indeed it does not.

      It will only redirect them to other targets you own.

    4. Mike007 Silver badge

      Re: Better security doesn't just stop the scammers

      This has nothing to do with passkeys.

      And in every example the reason has been the same: People think when they lose a phone or switch provider they need to get a new phone number???

      If your phone is stolen, you ask your provider for a REPLACEMENT SIM instead of signing up for a brand new contract... Problem solved.

  4. sarusa Silver badge
    Devil

    Passkeys are a bad idea, or at least badly implemented

    Basically, they started with the premise that 'passwords are bad', which I will even agree with, and then came up with something worse.

    Yes, it's very convenient for the machines where you have biometrics and only need access from that machine (though just using keepass seems just as convenient). It's also (as noted) a complete disaster if you lose the device with the passkey or things go wrong. Best case, then, you fall back to... yes, passwords, so you still need good passwords.

    I also need access to things from multiple machines, most of them lacking biometrics, including in places where, guess what, there's no cell service. So passkey on phone fails even if I wanted to put all my security on the phone. I actually lost my phone in a lake this year - this would have been a real problem. But MS doesn't give a shit about that, nobody there is ever using the crap they're actually peddling in the real world.

    So far I haven't found anything better than keepass file with deceptively named keyfile + password, 20 char unique passwords for every site. I'm not dependent on a 3rd party like LastPass (boo!) not to have another breach. I use pcloud to distribute it where I need it. And then I use Authy for 2FA. Thanks to these I was only mildly inconvenienced by losing my phone this year rather than it being a complete farking disaster (I just switched to my tablet for the time). Again, whatever password system works for you - it's still better than passkeys.

    1. Dan 55 Silver badge

      Re: Passkeys are a bad idea, or at least badly implemented

      Welcome to hotel Microsoft. The default behaviour will be your MS account saving all your passkeys for all your apps/online services. Who's going to leave then?

      1. Anonymous Coward
        Anonymous Coward

        Re: Passkeys are a bad idea, or at least badly implemented

        No... the default behaviour will be "login with your Microsoft account". Just like now you see the options to login with your Google\Apple\Facebook accounts...

        Am amazed Micro$oft is being so slow on this front.

        1. richardnpaul

          Re: Passkeys are a bad idea, or at least badly implemented

          Log into your microsoft account, from a new Win11 machine, when your account is protected by passkeys, and you don't have any passkeys on the device, yet.

      2. Anonymous Coward
        Anonymous Coward

        Re: Passkeys are a bad idea, or at least badly implemented

        "We are all just prisoners here, of our own device"

    2. DS999 Silver badge

      Re: Passkeys are a bad idea, or at least badly implemented

      Yes, it's very convenient for the machines where you have biometrics and only need access from that machine

      There is no reason passkeys can't be transferred between the various pieces of hardware you own, so long as you "bless" them appropriately. That's already possible within your (Apple/Google/Microsoft) ecosystem, the missing piece is to make it possible outside of your ecosystem. That's something they are working on, and maybe it is partially there already (my "other hardware" is Linux so I'm assuming it will take longer to get there than it will between the big three)

      My ideal would be to keep the passkeys on my iPhone (where they are secured, securely backed up, and can be securely recovered if I lose my phone) and have it talk via bluetooth to my PC so when I login to the Reg it would tell my browser "access passkey for www.theregister.com" and my browser would talk to the Fedora/GNOME key manager which would talk via bluetooth to my iPhone (which I would have previously allowed to talk to my Linux PC if asked for a passkey) and my phone would require me to authenticate via Face ID if I hadn't done so within a configurable number of minutes (because I don't want to keep looking at my phone for every login) and then provide the passkey to the Linux PC which could use it to login to the Register. I suspect we're a few years away from it being this smooth, but we'll get there faster for people staying inside the "big three" ecosystems.

      1. Anonymous Coward
        Anonymous Coward

        Re: Passkeys are a bad idea, or at least badly implemented

        Are they, though?

        Seems like they've been "working on it" for rather a long time.

        1. DS999 Silver badge

          Re: Passkeys are a bad idea, or at least badly implemented

          What do you mean working on it for a long time? Microsoft only just started supporting passkeys THIS YEAR. Until that was rolled out no one was going to start worrying about next step improvements to the spec.

    3. Art Slartibartfast
      Black Helicopters

      Re: Passkeys are a bad idea, or at least badly implemented

      Until know I have been able to avoid biometrics for access to anything. If my biometric data is compromised, it is kind of impractial get a new face or new fingerprints.

      1. DS999 Silver badge

        Re: Passkeys are a bad idea, or at least badly implemented

        You still can. Passkeys are intended to work with biometrics because they're easier, but you can use them with the password to your phone if you haven't set up biometrics.

        I think you're being needlessly paranoid. If you use biometrics for your phone the information doesn't leave the phone so I'm not sure how doing so increases the chance of your biometric data "being compromised". It is likely you've been fingerprinted at some point in your life, if so that information is out there and you have no control of it. If you haven't, someone can trivially lift them unless you wear gloves 100% of the time you're in public. You face has already been photographed countless times, including many where they know your identity like at your bank.

        So how would using biometrics on your phone increase your risk of compromise, when that's actually the only place where you AREN'T at risk of having your biometric information compromised?

        Now you could argue it puts your PHONE at risk of being compromised, if someone who has access to your prints or face is able to leverage that to fool your phone and get in. But unless you NEVER unlock your phone in public using a password (or worse, the default numeric PIN) cameras, and likely people, have or certainly could have observed it. The bar for shoulder surfing and typing in your password is a lot lower than the bar for using photos/prints to break in to your phone via biometrics.

        1. sabroni Silver badge
          Boffin

          Re: Passkeys are a bad idea, or at least badly implemented

          Biometrics are user ids not passwords

          1. DS999 Silver badge

            Re: Passkeys are a bad idea, or at least badly implemented

            They are a single factor, the possession of your phone or PC that uses biometrics for authentication is the second factor. Don't let yourself be chained to the past's "user/password" paradigm. That has completely failed in the modern world and is well past its sell by date.

        2. M.V. Lipvig Silver badge

          Re: Passkeys are a bad idea, or at least badly implemented

          Not compromise but loss of access. I play an auto mechanic in my spare time, and my fingerprints are not what they used to be due to scratches, cuts and chemical usage. All it would take is a minor auto accident to change your face enough that your machine would no longer recognize you.

    4. sev.monster Silver badge

      Re: Passkeys are a bad idea, or at least badly implemented

      Passkeys aren't a bad idea. The technology underpinning them—WebAuthn, FIDO2, etc.—is sound, and has been sound for years. But the current marketing push, redefinition of terms, confusing technical landscape, and improper security posture of basically every layperson using them, has provided the vast majority of end users no tangible benefit.

      The term "passkey" was created (by Apple as far as I know) to help signal-boost WebAuthn and related technologies. It was and is a marketing term, with no relation to the FIDO Alliance or the FIDO/WebAuthn specifications. The actual result of this independent third-party push has been endless confusion on what a "passkey" even is, with vendors fighting over the exact definition. Meanwhile, over a decade of existing technical and end-user documentation that talks about WebAuthn/CTAP/FIDO2/FIDO/U2F never mentions "passkeys". I've met people that think passkeys are a completely separate technology, incompatible with WebAuthn... And in some cases, that may even be true.

      Current consensus is passkeys are "probably WebAuthn credentials". But who knows what anyone actually means by that when they say it.

      I've been using hardware security keys for years for all of my credential needs, and not only does it make signing in faster compared to having to remember/type out passwords, it's substantially more secure. Each site with FIDO2 compatibility gets a separate credential on each of my keys, so if I lose one I can revoke the credentials that specific key stored. Everyone else with OATH 2nd factor gets that. Where a password is required, I use a static password stored on the key, combined with an easy to remember prefix/suffix—or a generated and saved password for services I don't think I'll need to log into without my password manager handy. In my opinion, this is the best security posture you can take—but there's absolutely no way you could get your average end user to adopt it... Meanwhile so many implementations of such forced security I've seen by providers has been lackluster to the point of irrelevance.

      1. DS999 Silver badge

        Re: Passkeys are a bad idea, or at least badly implemented

        So tell me, how do you login to the Register using your hardware key?

        1. Jou (Mxyzptlk) Silver badge

          Re: Passkeys are a bad idea, or at least badly implemented

          Well, I take the hardware key "q", followed by "l", followed by "y", followed by.....(15 keys later) ENTER.

    5. Mike007 Silver badge

      Re: Passkeys are a bad idea, or at least badly implemented

      > I also need access to things from multiple machines, most of them lacking biometrics, including in places where, guess what, there's no cell service. So passkey on phone fails even if I wanted to put all my security on the phone.

      how do you currently do this? Password manager on every device? So that would mean every device has your passkeys... Or do you type your passwords in to devices that you don't trust enough for a password manager on them? Because passkeys would mean NOT giving those untrusted devices a copy of your authentication credentials.

      The way this works is that the device you want to log in with displays a QR code which you scan with your phone. Then you authenticate with your phone (biometrics?) and your phone uses Bluetooth or WiFi or whatever way it has to talk to the computer to act as its authentication device. The computer sends the challenge and server name, then the phone signs the challenge and gives the signature to the computer to send to the website. This works without an internet connection (except the part where the service you are trying to sign in to is a web page!). It also is also not vulnerable to phishing sites.

      All of the issues people have with passkeys are due to the fact that they want to store them on a single device instead of a password manager... Read various comments above for multiple examples of people having the exact same problem with passwords stored on a single device.

    6. Mage Silver badge
      Flame

      Re: Passkeys are a bad idea, or at least badly implemented

      Only bad passwords, or badly used passwords are bad. Passkeys are for people that use Leeds11 for every password. They should be optional.

      I now have two phones. One never leaves the house and is the number for 2FA. The other in my coat pocket has no important apps or 2FA.

      Also if I don't top up the phone often enough the operator will withdraw the number and recycle it. Unused top-up is expired, which IMO is theft. The Telecom/Radio regulators are on the side of the Mobile operators, rather than all spectrum users and consumers. These issues need fixed and passkeys and also 2FA should be optional, because the big companies refuse to interact with individuals and are often poor at IT.

      1. skiew

        Re: Passkeys are a bad idea, or at least badly implemented

        Using a password manager with strong authentication to access it (like on my PCs or phone; anytime I need the password manager, I have to authenticate with Windows Hello or Samsung's solutions, which is quick and secure).

        So I never even see those random passwords...

        The only problem is that the password manager is ultimately protected with 2FA including a password, which is only needed before adding biometric authentication, for instance.

        Instead of this, they could allow unlocking from zero with my Microsoft Account, the only thing not relying on the password manager...

        So this is not for people with the password CatName123 but for everyone.

  5. Kaltern

    There is no security.

    Nothing is secure. Nothing. The illusion of security is just another method of control.

    - Me.

    1. skiew

      Re: There is no security.

      You have to suppose nothing is entirely secure and everything is compromised (including people, but that's the weakest link in all systems)...

      This is zero trust.

      In practice, many ways exist to make something really secure. Another security measure is that people like me and us all probably aren't going to be targeted by state-sponsored hackers, etc.

      So we have fairly secured mechanisms.

      The idea that security is about control... tin foil hat, etc. I don't discuss that part.

    2. Mike007 Silver badge

      Re: There is no security.

      Passkeys use the same cryptography that the rest of the world uses.

      If you can break that, you don't log in to random people's email accounts... you tell your bank that the Bank of England just transferred a couple of billion £ in to your bank account.

  6. Anonymous Coward
    Anonymous Coward

    Once breach to breach it all

    (repeat same)

    Once your device that uses Passkeys is breached - Everything is breached. If you have passwords (and they are unique) only one thing is breached. If you use MFA with a password, you are as safe as you can be.

    The hardware keys are only to sell you a new device, have been in use for over 20 years and clearly not the answer.

    MFA has saved our company 3 times from Email pass the hash (malicious Emails abusing MS authentication), and a couple times from idiots putting their password in a fake OWA site. - and Conditional access alerted us.

    Companies want to move you from things you have, to things you access. This is how to cut people off from all services/access in one bite.

    1. DS999 Silver badge

      Re: Once breach to breach it all

      Passkeys aren't accessible to the OS, or at least they aren't supposed to be. They'd be secured by the security chip on the device (Secure Enclave on iPhone/Mac, TPM on PC, whatever Android calls theirs) and you'd access it via biometrics (or a password on your phone if you are too paranoid to use biometrics)

      That protects it against remote exploit, or even remote compromise of your phone. Physical security is beyond the scope of what passkeys are intended to do.

      1. Anonymous Coward
        Anonymous Coward

        Re: Once breach to breach it all

        "Passkeys aren't accessible to the OS, or at least they aren't supposed to be."

        Yea, right. Literally every single bit of information is fully accessible to OS and, specificially, OS owner. Remotely. Microsoft, Google, Apple, you name it.

        Assuming they won't access it the nanosecond it is created, is pure naivety: Single key which opens full access to *everything* user is doing: That is the first thing which will be sucked to mothership.

  7. chivo243 Silver badge
    Boffin

    I just came to say

    Soylent Green is People

    Open the Pod bay doors Hal

    Ah, Roedecker...

  8. Jou (Mxyzptlk) Silver badge

    So it is THIS scene - in an endless loop.

    Up to now I was planning to use 10 loops of this scene to illustrate why MS is hated - every hit knocks an MS-important-notification-we-have-a-new-feature popup away.

    Now it will be an endless loop... "how often to show a nudge"...

  9. Anonymous Coward
    Anonymous Coward

    So, passkeys

    Just very long passwords, so complex that they have to be written down, stored in a file, entered automatically when needed by whomever has access to the device they are stored on. Sounds great. Luckily most will be stored on a really secure windows pc or an android phone, 80% of which no longer receive security updates. This is real progress, not, we are living in Idiocracy.

    1. FirstTangoInParis Bronze badge

      Re: So, passkeys

      Indeed this is just SSH keys for logging in to services via web browser. The crucial thing being “do you trust this machine”. If said machine is stolen or irreparably damaged, unless there is some second way in (eg an app where you can kill all other sessions and block until you can recover the situation, you’re basically stuffed, about this much: https://youtu.be/Bex5LyzbbBE?si=uc0HnIYEm6eqeLGv

    2. find users who cut cat tail

      Re: So, passkeys

      Please read something about asymmetric cryptography. At least the very high-level summary in the article.

      1. Anonymous Coward
        Anonymous Coward

        Re: So, passkeys

        Read this, everything on a computing device is a file.

        1. Jou (Mxyzptlk) Silver badge

          Re: So, passkeys

          Including the MBR, RAM, communication bus, external ports, HDMI connection, power supply, CPU, your hard-drives or punch cards....

          Seriously: The unix-like "everything is a file" is outdated. It works fine for some things, but not all. No unix does that for 100% since it is way to inefficient or impractical for many things, and all current unix-like OSes are further away from that than ever before.

    3. Anonymous Coward
      Anonymous Coward

      Re: So, passkeys

      12 upvotes for someone who clearly doesn't understand Passkeys. Standards round here have fucking plummetted.

      1. Jou (Mxyzptlk) Silver badge

        Re: So, passkeys

        > 12 upvotes for someone who clearly doesn't understand Passkeys

        You deserve 120 down votes for not understanding why passkey avoidance is preferred. Second factor fine, but not by a check-method which can break way too easily. So you always need TWO fallback methods which are not could and not just another passkey when that thing fails.

        You posted as AnonCoward for the reason to speak nonsense. I prefer those who post as AnonCoward for either job of life security...

  10. Tron Silver badge

    This why we need a Pi-based alternative.

    So we can ignore the fascist diktats of the Microsoft reich.

    1. Snake Silver badge

      Re: This why we need a Pi-based alternative.

      It has nothing to do with "Use Pi!". If you stop exposing yourself to cloud infrastructure, that'll fix (almost) everything. You don't need a passcode to access your own [desktop] copy of LibreOffice, now do you??

  11. joed

    a vendor lock-in trap

    MS surely hopes to "safeguard" all your secrets even if against your will. Hard to leave their walled garden when they keep all your keys. Apple's copycats.

    And while offering no portability, I bet that they serve their passkeys with AI.

  12. Mike 137 Silver badge

    Unmentionables

    One of the most robust (technically speaking) authentication tools is the out of band one time key generator dongle, and these have been around for ages. But I have witnessed many instances where the dongle had been stored with the laptop in the same bag when stolen.

    Any sole authenticator approach (however technically 'sophisticated') is pants, hence MFA.

    1. M.V. Lipvig Silver badge

      Re: Unmentionables

      My company used to use those dongles. Now it's a program on the computer. There's no longer a need for a thief to be burdened by carrying two things.

  13. mpi Silver badge

    Every time I see "Microsoft" in the title of an article...

    ...I already know that reading it will give me a very good feeling about my decision to ditch everything coming from them in favor of Linux many moons past.

    And I have never been disappointed in that assumption.

  14. Anonymous Coward
    Anonymous Coward

    Example of bad passkey type system - googs, but similar enough

    https://krebsonsecurity.com/2024/12/how-to-lose-a-fortune-with-just-one-bad-click/

  15. TheMaskedMan Silver badge

    "but we don't let them permanently opt out of passkey invitations"

    I'm sorry, whose PC is this again? Hint: it is not yours.

    If I want to opt in to your latest scheme I will do so. If I don't, I won't and you have no right to harass me about it.

  16. Mike_R
    Linux

    Solution to "Microsoft won't let customers opt out of passkey push"

    See icon

    Seems to work for me...

  17. xyz Silver badge

    Mmmmm....

    I was harbouring thoughts yesterday of a Raspeberry Pi 5 with ubuntu 24.04 lts. Better turn my thoughts into reality after Xmas.

  18. StrangerHereMyself Silver badge

    Adapt

    Scammers will most likely adapt by infiltrating smartphones in order to steal or generate passkeys.

  19. pip25
    WTF?

    "No password entry or 2FA step is required."

    I can understand the first part, since passkeys can basically function as very secure passwords. But why no 2FA? If my passkey is stored in my desktop browser, proving that I have access to my phone as well would offer better security, would it not?

    1. DS999 Silver badge

      Re: "No password entry or 2FA step is required."

      Passkeys are not stored in your browser. I think you are misunderstanding how they work.

      The browser doesn't store them, the operating system does - and they are stored in the secure area like the TPM or the phone's equivalent so someone who breaks into your PC can't just read a file and steal them. When the browser encounters a site using passkeys for login it can request the passkey for that site from the OS which authenticates the user (typically biometrics, but it could be a password if you don't like biometrics or your device doesn't support them) before it can be used to access the site.

      An additional 2FA step would be meaningless because you already have two factors. One you have the device containing the passkey. Two you have authenticated to the device using either biometrics or a password to be able to utilize the passkey.

      1. Mike 137 Silver badge

        Re: "No password entry or 2FA step is required."

        "you already have two factors. One you have the device containing the passkey. Two you have authenticated to the device using either biometrics or a password to be able to utilize the passkey"

        Unless I've misunderstood, that means however 'secure' the passkey itself is, overall security is only as strong as whatever authenticates access to the device, which can break down in event the device is in the wrong hands. There is apparently no universally robust authentication system that remains so in all eventualities.

        1. DS999 Silver badge

          Re: "No password entry or 2FA step is required."

          There is apparently no universally robust authentication system that remains so in all eventualities

          You think that's news to anyone?

          Passkeys aren't intended to be this universally perfect authentication system. They are intended to solve by far the biggest problem with passwords, remote compromise using your login credentials, by making it essentially impossible to remotely steal your login credentials.

          So no more mass emails telling everyone they need to change their passwords, and the inevitable follow on attacks at many other sites since regardless of warnings many people respond to the difficulty of remembering passwords by using the same password in many places. It won't stop hackers from breaking into sites using methods other than login credentials and stealing all the personal info they contain, but when you're using passkeys they can't steal your login credentials so they can't leverage that attack to attack your login at other sites. Hackers that p0wn your PC and run a keylogger on it won't be able to leverage that to be able to steal the login to your bank or email account.

          Passkeys solve some really big problems. There are many other problems they do not solve at all, because they are not trying to solve them. That doesn't make them worthless. If you're waiting for a "universally robust authentication system that remains so in all eventualities" I hope you are immortal, and have made plans for outliving the end of the universe. Because I have a feeling being the only intelligent being in existence might be the only way to achieve perfect security.

      2. bigtimehustler

        Re: "No password entry or 2FA step is required."

        That is a fundamental misunderstanding of two factor authentication. The idea is that you authenticate with a separate device. Not the same one. If someone steals my laptop and they need my phone to authenticate, that is more secure than credentials stored in TPM, thereby accessible to a logged in single device.

        1. Mike007 Silver badge

          Re: "No password entry or 2FA step is required."

          No. The device you are using to sign in with is a separate factor to the credentials required to authenticate (aka unlock the passkey). If you could use a passkey with no further authentication then that would be single factor, but that is actually quite hard to make work.

        2. DS999 Silver badge

          Re: "No password entry or 2FA step is required."

          No its not. Two factor authentication isn't two devices it is two separate methods of authentication. i.e. "something you have" (your phone) and something you are "the person with a face that can unlock the TPM/Secure Enclave on that phone".

          Do you consider it to not be two factor authentication in secure installations that have a fingerprint reader or iris scanner on the door, along with a keypad to type in a PIN? In that case it is "something you are" (the person with the fingerprint/iris) and "something you know" (the PIN) They could make it 3FA by having you also use a smart card like a CAC, that would add "something you have".

      3. pip25

        Re: "No password entry or 2FA step is required."

        Thanks for the explanation, but this does not seem to mesh with how I saw passkeys being used. My only interaction with them so far has been through the Proton Pass extension, which stores my passkeys encrypted in the cloud somewhere. I can retrieve them on any device I install that extension/app on.

  20. An_Old_Dog Silver badge

    This is Advertising Tech

    ... developed and tested under the guide of "improved security."

  21. bigtimehustler

    It is total nonsense, every single provider that I've currently used a passkey for also accepts username and password login with 2fa. So, why bother? There is no more security than just using the password.

    1. Mike007 Silver badge

      The passkey is not only more convenient, but more secure.

      You can't phish a passkey.

    2. DS999 Silver badge

      every single provider that I've currently used a passkey for also accepts username and password login with 2fa

      Of course they do. Passkeys are only getting started - Microsoft has supported them for less than a year and it requires Windows 11 which a minority of PC users are using. No site will be able to go passkey only for a few years yet, except maybe some internal corporate sites where they have a captive audience they know will have the necessary requirements down and can be forced to use them.

      You could have made the same arguments about 2FA, since pretty much every site that supports 2FA simultaneously supported single factor authentication for a long time. Many STILL do. When sites doing 2FA with SMS finally move to something better, you can be sure they will continue supporting SMS based 2FA for at least a year and maybe essentially forever rather than force everyone to use TOTP or passkeys or whatever that are more secure but are also more difficult for less technical users to understand (and those types of users don't WANT to understand or learn anything new, they were pissed when you forced them to type in a code delivered by SMS a few years back)

  22. Mike007 Silver badge

    Would you be surprised to find that Apple are the only problem we have with passkeys? Considering their PR on the subject...

    On apple devices you can only use them in browsers. If an application opens a webview Apple arbitrarily disables things like passkeys in it... This is why you can't require people to use passkeys for non-web-based logins to for example o365 if you have even a single apple user.

    If apple fixed this problem we would no longer require users to enroll every device they want to use in bloody company portal (which only 1 company can do per device) in order to get phishing protection for our o365 users.

    We have users who work for multiple companies. So far we have managed to be "first" to enroll a users device, but it's only a matter of time...

  23. skiew

    Passwordless has existed for a long time at MS, and it is for the user's benefit. And this is not related to Windows Hello, which was one of the many ways to authenticate and also a branding for a set of methods. 2FA can use, and sometimes for almost 20, fingerprints, SMS, OTP, and PIN, hardware security keys, and it seems this is the topic, FIDO "passkeys" (which are not replacing 2FA, in the sense you have to unlock them, or that may still be asked for another auth even with magic passkeys), which were supported already, but generation and storage, if I may, were provided by 3rd parties, and for a long time, now they can be stored by Microsoft.

    Any provider can generate a passkey for Microsoft... And this can be used with Windows Hello or Samsung Knox-backed authentication...

    None of my passkeys are stored in Microsoft Auth, even for Microsoft accounts, and I have not been "nagged" nor harassed by Microsoft on the topic.

    Microsoft is the first by far to have offered true passwordless authentication, for instance, and unified tech like Windows Hello (and probably support for fingerprint scanners; they existed before Touch ID, before anyone asks).

    I don't really understand what the issue is here. You can add many ways to authenticate. If the issue is that you have to use a passkey (from any provider), a secure authentication method, and not the same password you use everywhere since 2003... this is another debate.

  24. cantankerous swineherd

    old bloke on windows 7 and a pi5 warmed up and ready to go: looks like I've dodged a bullet.

    I'm in a senior persons group which uses password protected resources, details omitted to protect the guilty. time not spent discussing colonoscopys is usually spent buggering about with passwords. nevertheless, I can see people moving to chrome book and android tablets rather than futzing with a passkey. what's a passkey? look for one on line and it's something costing 50 quid that the average oap (ie someone confused by passwords) can't even conceptualize.

    I see equality issues ahead...

    1. Mike007 Silver badge

      Umm... Passkeys aren't something you buy. A website asks your device to generate one, then when you want to log in the website asks your device to sign a challenge using the passkey it previously generated and registered.

      Example flow for a user wanting to save on the device they are currently using:

      Create passkey: You click the "create passkey" button on the relevant website, select the current device, then you touch your fingerprint reader.

      Log in: You click "Log in using passkey" (Microsoft are getting rid of this step) then you touch your fingerprint reader.

      Of course if you want to use your laptop but have your passkey on your phone there is the additional step of selecting the device to use when logging in. The first time you scan a QR code, after that you select it from a list.

      IT people who understand passkeys love them because they provide complete protection from phishing attacks, are completely un-bruteforeceable, and can not be compromised by malware (unless you're saving them in a software password manager and the malware is in the kernel of course).

      Users love them because they can log in by just pressing their fingerprint scanner.

      If you waste a lot of time fucking around with passwords, you should use passkeys instead. They are idiot proof. However I do not know what windows 7 support is like... (The actual APIs used by passkeys have existed since the early internet explorer days, however the specific type of certificate is new)

      1. BPontius

        Then someone copies your fingerprint and highjacks your accounts, retina, facial recognition are all passwords that can be stolen. The oils and moisture from your finger is left on the fingerprint scanner and can be stolen. Biometrics are data points stored in your PC or the cloud and can be stolen, copied or changed just like passwords. Passkeys are just euphemisms, substitutions for passwords to give the illusion of being more secure.

        There is no such thing as idiot or fool proof, unhackable security, pure fantasy.

        1. MachDiamond Silver badge

          "Then someone copies your fingerprint and highjacks your accounts, retina, facial recognition are all passwords that can be stolen."

          All of those things have to be broken down and turned into some form of data a computer can understand. If you suss out how that works for some system, you can harvest people's attributes via social engineering. It would take some brass ones, but if you set up a facial ID kiosk at an airport you could get plenty of people to offer up fingerprints, facial scans, etc and just return them an error page that directs them to try another kiosk while gathering and storing their biometrics, their ticket, some data off of their phone and so forth. Not saying it would be easy, just possible.

        2. Mike007 Silver badge

          If you had a level of security requirement where you were worried wiping the fingerprint reader after using it would be insufficient, you can add a device password. Which is protected from brute force attacks and doesn't have to be different for every website.

          However such an attacker would probably also throw in an old school keylogger at the same time, because why not?

          If you are worried about someone like me having a strong motivation to compromise you, your windows 7 system is already riddled with spyware... logging every keystroke and stealing every cookie, sending it to me in realtime. Are you at least using TPM based full disk encryption to make it more interesting for me?

          Security requirements vary. Biometrics in practice are way more secure than passwords. Which is why even websites requiring passwords you should use a random password that is stored somewhere that you unlock with biometrics.

          There is a reason that the way to identify a real IT professional is where they look when a user is typing a password in to their device or entering a PIN in to a payment terminal etc.*

          * Note: The one time a professional DOES look at the PIN pad as someone types the PIN is when entering a building they will be working in. Those who started their career looking away should eventually have learned that lesson...

  25. Kev99 Silver badge

    "Enrollment invitations will continue until security improves" So mictosoft customers are going to have those annoying messages foisted upon them until mictosoft closes its doors, eh?

  26. razorfishsl

    DO NOT fall for this bullshit.

    go read the supreme court ruling on this and police powers....

    Basically it goes like this;

    If the police ask you for access to your pass-worded device and you say no, they have to get a warrant and can only search for material in the warrant and they have to prove a crime or suspect one.

    HOWEVER if your device is protected by "bio-metric" data ,the police are allowed to FORCE access by using your face or thumbprint WITHOUT A WARRANT.

    giving them FULL access to EVERYTHING and without PROBABLE cause!!!

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like