Avatar

ag10n

ag10n@lemmy.world
Joined
0 posts • 30 comments
Direct message

Passkeys are a replacement for passwords, not a second factor like requiring a physical key.

Why would I reduce the number of factors and also entrust what should be something I know to a vulnerable key store.

https://www.bleepingcomputer.com/news/security/new-tpm-20-flaws-could-let-hackers-steal-cryptographic-keys/

permalink
report
parent
reply

Do I need a subscription service for this passkey supported password manager? Or I can just buy a hardware key that can be used on my phone or any device, password manager supported or not. Seems like the freedom and portability of a physical key, like a key to your home or car makes a ton of sense.

Passkeys are based on and supported by the FIDO alliance.

https://fidoalliance.org/passkeys/

permalink
report
parent
reply

What options are there for migrating passkeys to a new device? Easy to lock you into that iPhone and you must use their migration tool when you upgrade. Or I just carry it on my keychain, no vendor lock in.

permalink
report
parent
reply

Tying a password to a browser or device isn’t going to make it any easier. Use a password manager and set unique string passwords for everything. If the app supports it, use FIDO physical keys instead of Passkeys

permalink
report
parent
reply

QSV is a very good product, high-quality and efficient. It’s also very mature, lots of signage in large deployments. I’ve tried AMD’s AMF streaming and at lower bit-rates you get a lot more blocking. It’s fine but QSV has an edge.

https://www.pcworld.com/article/827992/tested-intel-arc-av1-video-encoder-vs-nvidia-amd.html

permalink
report
parent
reply

If your uni asks you to install a certificate or any software on your devices, they would have access to your device. When you connect to a network they own, you can assume they’re inspecting the traffic that crosses those services. A VPN like WireGuard or OpenVPN can help to mask it.

permalink
report
reply