Brutkey

Brian Anderson (He/Him)
@btanderson@infosec.exchange
Brian Anderson (He/Him)
@btanderson@infosec.exchange

Once upon a time, I had conservative gun-hoarding friends who, when asked, would tell you they needed them in case the government turned its military on innocent civilians and citizens.

It’s been a long long while since I’ve seen them, but I’ll bet those guns are still as clean and sterile as the day they bought them. Even on the days when a president unleashed the military on a whole-ass city.

#USPol

Brian Anderson (He/Him)
@btanderson@infosec.exchange

@markwyner@mas.to I think the problem here is that β€œOne Key to Rule Them All” is a fine slogan, but actually a very difficult and impractical strategy to manage. Passkeys, digital and physical, need to be viewed as one part of a multipart solution including having alternate authentication/recovery methods, backup keys where possible, etc.

I love my yubikey, its reduced my overreliance on password managers…it was great until I left it home while on vacation out of state. But having other secure authentication methods available blunted the impact somewhat.

The bigger problem is the uneven, inconsistent way passkeys are implemented in products. It’s absolutely impossible to teach someone not already infosec savvy how passkeys work, because the UI from site to site, app to app, is so janky.

Brian Anderson (He/Him)
@btanderson@infosec.exchange

@markwyner@mas.to also, btw, I support the β€œbuy two, register two, hide one” approach to hardware keys.

Brian Anderson (He/Him)
@btanderson@infosec.exchange

Exponentially proportional if the AI conversation references surveillance products.