[-] Greensauce@sh.itjust.works 4 points 7 months ago

Looks like they are just rolling out support for Android 14 and up.

https://blog.1password.com/save-use-passkeys-android/

[-] Greensauce@sh.itjust.works 63 points 7 months ago

Proton is also the ONLY passkey provider that I've seen allowing you to store, share, and export passkeys just like you can with passwords!

1Password has had this for several months.

As others have mentioned, Bitwarden also has this. This really feels like an ad.

[-] Greensauce@sh.itjust.works 4 points 11 months ago

Holy shit…glass shattered. I fucking loved Pushing Daisies and I never even made that connection with how mean he is in Foundation comparatively.

[-] Greensauce@sh.itjust.works 3 points 1 year ago

These are characters from the Dragonlance series. Great multigenerational fantasy series.

[-] Greensauce@sh.itjust.works 5 points 1 year ago

Assuming you mean Ragnarok? The 2018 version of GoW already came to PC.

[-] Greensauce@sh.itjust.works 9 points 1 year ago

You don’t have to store them with Google. Passkeys are supported in both iOS and Android natively. Within the last few months both Bitwarden and 1Password support storing passkeys as well.

[-] Greensauce@sh.itjust.works 20 points 1 year ago

I’m stealing this from another comment:

The main advantage comes with phishing resistance. Standard MFA (time based codes) is not phishing resistant. Users can be social engineered into giving up a password and MFA token. Other MFA types, such as pop up notifications, are susceptible to MFA fatigue. Similar to YubiKeys, Passkeys implement a phishing resistant MFA by storing an encryption key, along with requiring a biometric. The benefit here is that these are far easier for the average user, and the user does not need to carry a physical device. Sure, fingerprints could possibly be grabbed with physical presence, but there is far less risk that a users fingerprint is stolen, than a user being social engineered over the phone into giving creds. For most organizations and users, this is far more secure.

[-] Greensauce@sh.itjust.works 3 points 1 year ago* (last edited 1 year ago)

It was a recurring bit on John Oliver’s show. Should be turned into a book though.

https://youtu.be/bV42PgyOFE0

[-] Greensauce@sh.itjust.works 2 points 1 year ago

Microsoft Authenticator does more than just TOTP codes. It allows IT departments to push https://learn.microsoft.com/en-us/mem/intune/apps/app-management instead of MDM on personal devices.

For apps like Outlook, Teams, and OneNote the app data can be wiped without wiping the whole phone.

For any of that to work, Microsoft Authenticator has to be used as the “broker” for that authentication.

Greensauce

joined 1 year ago