Goverp wrote:"Hype" would be as in a new name for old technology that's not particularly used.
As I read it, this is supposed to be more than just 2FA, specifically getting rid of passwords, which I'd quite like.
This matches my understanding of the Passkey approach. You own the key to your data and by the magic auf asymmetric cryptography you do not have to disclose it.
"Hype" as you defined it, yes. Key-based ssh logins is concept-wise quite similar. New are the standards (e.g. WebAuthn) evolving around this approach, making it usable for the masses. Service providers may offer you to store/synchronize the key for you. Whether this is a good idea, depends on your use case. It may add convenience and recovery options for the sake of security. As usual there is no one-size-fits-all.
spica wrote:The adoption of passwordless devices introduces a potential vulnerability,
allowing third parties to gain unauthorized access or decrypt disks in the
absence of the device owner.
I do not get this point. The device/application holding the private key is essential for gaining access to the data. How save this device is and also the Passkey setup/implementation, is another story.
spica wrote:While the password may still exist, residing
either on the target system or within the device as a key, the decision
to disable user passwords seems like an effort to shift responsibility from
the system to the end user, in my opinion.
Generally there is no password involved any longer. Its role is replaced by the private key. The latter may be secured by a password or 2nd factor, but without the key these factors are not sufficient to access your data. And yes, a strict implementation (where only you have stored the private key) gives you exclusive access to your data and if you loose the key, you loose your data. As mentioned above, the right approach depends on your use case and the sensibility of the data.
Yubico has a nice description how Passkeys work:
https://developers.yubico.com/Passkeys/ ... _work.html
It also shows who may be involved into a Passkey solution and may have access to parts of the security chain. E.g. in this document the "application" owns the private key. If this application is not trustworthy or not running in an trustworthy environment, the security is reduced.
Best regards,
Holger