{"id":45393,"date":"2024-10-16T14:04:43","date_gmt":"2024-10-16T18:04:43","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=45393"},"modified":"2024-11-05T14:10:31","modified_gmt":"2024-11-05T19:10:31","slug":"passkeys-credential-exchange","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2024\/10\/16\/passkeys-credential-exchange\/","title":{"rendered":"Passkeys Credential Exchange"},"content":{"rendered":"<p><a href=\"https:\/\/9to5mac.com\/2024\/10\/14\/new-passkeys-import-export\/\">Filipe Esp&oacute;sito<\/a> (<a href=\"https:\/\/news.ycombinator.com\/item?id=41847787\">Hacker News<\/a>, <a href=\"https:\/\/www.macrumors.com\/2024\/10\/15\/fido-alliance-portable-passkeys-across-platforms\/\">MacRumors<\/a>, <a href=\"https:\/\/sixcolors.com\/link\/2024\/10\/passkey-industry-group-releases-draft-standard-for-import-and-export\/\">Dan Moren<\/a>):<\/p>\n<blockquote cite=\"https:\/\/9to5mac.com\/2024\/10\/14\/new-passkeys-import-export\/\"><p>As <a href=\"https:\/\/fidoalliance.org\/fido-alliance-publishes-new-specifications-to-promote-user-choice-and-enhanced-ux-for-passkeys\/\">just announced by the FIDO Alliance<\/a>, the new specifications aim to promote user choice by offering a way to import and export passkeys. The draft of the new specifications establishes the Credential Exchange Protocol (CXP) and Credential Exchange Format (CXF) formats for transferring not only passkeys, but other types of credentials will also be supported.<\/p><p>[&#8230;]<\/p><p>1Password, which worked with the FIDO Alliance on the new specifications, <a href=\"https:\/\/blog.1password.com\/fido-alliance-import-export-passkeys-draft-specs\/\">has already committed to supporting the new passkey import and export formats<\/a> as soon as they become available. Other companies such as Dashlane, Bitwarden, NordPass, and Google also worked on the <a href=\"https:\/\/fidoalliance.org\/specs\/cx\/cxf-v1.0-wd-20240522.html\">draft of the new specifications<\/a>.<\/p><p>Although nothing has been said about Apple, the company is also part of the FIDO Alliance and was one of the first to introduce support for passkeys in 2022 with iOS 16.<\/p><\/blockquote>\n\n<p>I don&rsquo;t love this framing because, to me, &ldquo;export&rdquo; means that it generates a standalone file that I can do with what I please. I can edit it. Or back it up and import it later&mdash;possibly into a different app. As far as I can tell, this is not that. It&rsquo;s more of a way to transfer passkeys between password managers. It&rsquo;s specifically designed to &ldquo;export&rdquo; an encrypted blob that can only be read by the password manager that requested the export. There&rsquo;s no use even storing the exported file because, unless you have a way to back up the <a href=\"https:\/\/fidoalliance.org\/specs\/cx\/cxp-v1.0-wd-20240522.html\">receiving private key<\/a>, you won&rsquo;t even be able to import it again. Maybe a third-party developer will make an app that requests\/receives an export and lets you access your own data.<\/p>\n\n<p><a href=\"https:\/\/mastodon.social\/@lapcatsoftware\/113308133338196824\">Jeff Johnson<\/a>:<\/p>\n<blockquote cite=\"https:\/\/mastodon.social\/@lapcatsoftware\/113308133338196824\">\n<p>Export and import should have been extremely simple. Instead, they took years to come up with some convoluted system where the only possibility is to transfer from one vendor lock-in to another vendor lock-in.<\/p>\n<\/blockquote>\n\n<p>The FIDO Alliance would probably say that not allowing true exporting makes it more secure, but I think that&rsquo;s only true in a kind of security-through-obscurity way. If you make an encrypted happy path for transferring credentials, people will use it because it&rsquo;s easier. Credential exchange <em>does<\/em> open the way for people to get at the decrypted data&mdash;it just makes it a pain and requires trusting an additional helper app. (Or are they going to somehow prevent non-<a href=\"https:\/\/mastodon.social\/@lapcatsoftware\/113308273654667583\">big-players<\/a> from participating?) If someone has direct access to my Mac and unlocked password manager, it&rsquo;s game over, anyway. So I fail to see what this is really protecting against. Do they think people will export CSV files and leave them on unencrypted storage?<\/p>\n\n<p><a href=\"https:\/\/www.theverge.com\/2024\/10\/15\/24270875\/password-manager-makers-transfer-passkeys-fido-alliance\">Jay Peters<\/a>:<\/p>\n<blockquote cite=\"https:\/\/www.theverge.com\/2024\/10\/15\/24270875\/password-manager-makers-transfer-passkeys-fido-alliance\">\n<p>&ldquo;It is critical that users can choose the credential management platform they prefer, and switch credential providers securely and without burden,&rdquo; the FIDO Alliance wrote in its press release.<\/p>\n<\/blockquote>\n\n<p>It&rsquo;s about platforms, not giving you control of your data.<\/p>\n\n<p><a href=\"https:\/\/mastodon.social\/@pilky\/113311647141953633\">Martin Pilkington<\/a>:<\/p>\n<blockquote cite=\"https:\/\/mastodon.social\/@pilky\/113311647141953633\">\n<p>This is a big improvement, but I&rsquo;m still very wary of any authentication system whose secret I can&rsquo;t easily write down on a piece of paper.<\/p>\n<p>Yes that may seem insecure, but I would also consider having a system that pretty much only major vendors can support to also be insecure in other ways. Loss of access is just as bad as being hacked as an authentication failure point.<\/p>\n<p>I really want to like Passkeys given they&rsquo;re technically much better, but their flaw is they require you to trust Big Tech (and do so in a far more important way than with passwords). Unfortunately Big Tech has used up pretty much all its remaining trust budget &#x1F937;&#x200D;&#x2642;&#xFE0F;<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/mstdn.social\/@pmdj\/113311693626540913\">Phil Dennis-Jordan<\/a>:<\/p>\n<blockquote cite=\"https:\/\/mstdn.social\/@pmdj\/113311693626540913\">\n<p>I particularly resent how they&rsquo;re treating their proprietary, heavily networked implementations in always-connected devices as superior to a mostly-airgapped FIDO2 device. Those USB key like devices don&rsquo;t have great UX, but I&rsquo;d rather see some iteration on that idea than allowing Big Tech to silently sync (i.e. delete, copy, insert, etc.) those secrets in my phone.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/me.micahrl.com\/blog\/concerns-about-passkeys\/\">Micah R Ledbetter<\/a> (via <a href=\"https:\/\/news.ycombinator.com\/item?id=41009681\">Hacker News<\/a>):<\/p>\n<blockquote cite=\"https:\/\/me.micahrl.com\/blog\/concerns-about-passkeys\/\">\n<p>Passkeys are a technically interesting idea with many upsides, but I am concerned about the power they take away from users.<\/p>\n<p>[&#8230;]<\/p>\n<p>The passkey spec is designed intentionally such that:<\/p>\n<ul>\n<li>Sites that use passkeys, like your bank, can tell what app you keep your passkeys in<\/li>\n<li>Site that use passkeys can choose to support some apps and not others<\/li>\n<\/ul>\n<p>This is not a hypothetical concern &#x2013;\nit&rsquo;s being discussed today with regard to the open source KeePassXC app.<\/p>\n<p>[&#8230;]<\/p>\n<p>The second ticket linked above makes it clear that sites are prepared to block passkey apps not just for their default settings, but for allowing certain actions to happen at all. In that ticket, the concern is that passkeys can be exported without being encrypted.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/news.ycombinator.com\/item?id=41856572\">tadfisher<\/a>:<\/p>\n<blockquote cite=\"https:\/\/news.ycombinator.com\/item?id=41856572\"><p>There are FIDO Alliance folks posting Github issues requesting to remove features such as plaintext exporting of credentials, with the explicit threat that the Alliance might block such &ldquo;open&rdquo; passkey providers in the future. A local database is not enough, it needs to be locked in a secure element or protected with some TPM-like scheme.<\/p><p>The spec allows for hardware attestation as well, to ensure passkeys are being provided from blessed computing environments. Hopefully implementers continue to ignore this anti-feature, because it&rsquo;s entirely stupid to lock out users who want to control their own security; at the same time, letting anyone with an Android phone restore passkeys from the cloud with one of their device PINs.<\/p><\/blockquote>\n\n<p><a href=\"https:\/\/news.ycombinator.com\/item?id=41856674\">Terr_<\/a>:<\/p>\n<blockquote cite=\"https:\/\/news.ycombinator.com\/item?id=41856674\">\n<p>I would also be concerned about whether you can recover when a provider becomes unusable or hostile, and there is no cooperative migration path.<\/p>\n<p>That might be the company going bankrupt, a physical or digital disaster, geopolitical firewalls, or simply a Kafka-esque bureaucracy where your entire account has been deleted without appeal because the company decided it was easier than figuring out the truth behind some moderation issue.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/world.hey.com\/dhh\/passwords-have-problems-but-passkeys-have-more-95285df9\">David Heinemeier Hansson<\/a> (<a href=\"https:\/\/lobste.rs\/s\/2mgwsz\/passwords_have_problems_passkeys_have\">Lobsters<\/a>):<\/p>\n<blockquote cite=\"https:\/\/world.hey.com\/dhh\/passwords-have-problems-but-passkeys-have-more-95285df9\"><p>We had originally planned to go all-in on passkeys for <a href=\"https:\/\/once.com\/campfire\">ONCE\/Campfire<\/a>, and we built the early authentication system entirely around that. It was not a simple setup! Handling passkeys properly is surprisingly complicated on the backend, but we got it done. Unfortunately, the user experience kinda sucked, so we ended up ripping it all out again.<\/p><p>The problem with passkeys is that they&rsquo;re essentially a halfway house to a password manager, but tied to a specific platform in ways that aren&rsquo;t obvious to a user at all, and liable to easily leave them unable to access of their accounts. Much the same way that two-factor authentication can do, but worse, since you&rsquo;re not even aware of it.<\/p><\/blockquote>\n\n<p><a href=\"https:\/\/www.corbado.com\/blog\/passkey-implementation-pitfalls-misconceptions-unknowns\">Vincent<\/a>:<\/p>\n<blockquote cite=\"https:\/\/www.corbado.com\/blog\/passkey-implementation-pitfalls-misconceptions-unknowns\">\n<p>With this blog post, I want to share with you the learnings on my way when working on a passkey-first auth solution and passkey intelligence with Corbado. All the hard truths, the unknown unknowns (factors that were not anticipated prior to my experience, essentially things we did not know we did not know), and the misconceptions should be uncovered, so that you know what to consider when implementing your own passkey-based authentication.<\/p>\n<p>[&#8230;]<\/p>\n<p>Implementing passkeys in a real-life project is 100x harder than you might initially think (trust us &#x2013; we&rsquo;ve gone through it).<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/lapcatsoftware.com\/articles\/2024\/8\/8.html\">Jeff Johnson<\/a> (<a href=\"https:\/\/mastodon.social\/@lapcatsoftware\/113164939122794876\">Mastodon<\/a>, <a href=\"https:\/\/news.ycombinator.com\/item?id=41635700\">Hacker News<\/a>):<\/p>\n<blockquote cite=\"https:\/\/lapcatsoftware.com\/articles\/2024\/8\/8.html\"><p>I don&rsquo;t want to place my credentials database under someone else&rsquo;s control and because I don&rsquo;t trust the availability and reliability of cloud sync. I prefer to manage credentials myself. Thus, I was surprised to find two passkeys in the &ldquo;Passkeys Information.csv&rdquo; file. I don&rsquo;t recall ever creating a passkey.<\/p><p>[&#8230;]<\/p><p>What I didn&rsquo;t realize until now is that enabling iCloud Keychain also automatically generated <code>apple.com<\/code> passkeys. I must have missed it at the time or forgot, but <a href=\"https:\/\/www.pcmag.com\/news\/phasing-out-passwords-apple-to-automatically-assign-each-user-a-passkey\">Apple automatically assigned passkeys<\/a> to users of iOS 17, iPadOS 17, and macOS 14 Sonoma. Since passkeys require iCloud Keychain, it makes sense that this happened the exact same time that iCloud Keychain was (forcibly) enabled on my iPad. However, I seem to have lost the passkeys when I manually disabled iCloud Keychain, because the new Passwords app in iPadOS 18 shows zero passkeys. I have no idea how to revoke the lost credentials on Apple&rsquo;s systems.<\/p><p>My question is, why does Apple have all of this personal, private information, stored in plain text?<\/p><\/blockquote>\n\n<p>Previously:<\/p>\n<ul>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2024\/07\/19\/apple-passwords-app-in-sequoia-and-ios-18\/\">Apple Passwords App in Sequoia and iOS 18<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2024\/05\/23\/the-dark-age-of-authentication\/\">The Dark Age of Authentication<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2024\/05\/21\/apple-updates-silently-enable-icloud-keychain\/\">Apple Updates Silently Enable iCloud Keychain<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2023\/07\/05\/family-passwords-and-passkey-providers\/\">Family Passwords and Passkey Providers<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2023\/05\/08\/passkeys-a-loss-of-user-control\/\">Passkeys: A Loss of User Control?<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2022\/06\/29\/passkeys\/\">Passkeys<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2018\/05\/07\/requesting-your-personal-data-from-apple\/\">Requesting Your Personal Data From Apple<\/a><\/li>\n<\/ul>\n\n<p id=\"passkeys-credential-exchange-update-2024-10-17\">Update (2024-10-17): <a href=\"https:\/\/mastodon.social\/@dimitribouniol\/113319122059978897\">Dimitri Bouniol<\/a>:<\/p>\n<blockquote cite=\"https:\/\/mastodon.social\/@dimitribouniol\/113319122059978897\"><p>For what its worth, exporting passkeys is non-trivial, because authenticators are sometimes expected to count how many times they&rsquo;ve signed a challenge, specifically so the server can ensure it hasn&rsquo;t been copied and used on the side by a non-trusted 3rd party &#x1F614;<\/p><\/blockquote>\n\n<p id=\"passkeys-credential-exchange-update-2024-10-18\">Update (2024-10-18): <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/amazon-says-175-million-customers-now-use-passkeys-to-log-in\/\">Lawrence Abrams<\/a>:<\/p>\n<blockquote cite=\"https:\/\/www.bleepingcomputer.com\/news\/security\/amazon-says-175-million-customers-now-use-passkeys-to-log-in\/\">\n<p>Amazon has seen massive adoption of passkeys since the company quietly rolled them out a year ago, announcing today that over 175 million customers use the security feature.<\/p>\n<\/blockquote>\n<p>I would not call it quiet since when users log in it prompts them to add a passkey. If you don&rsquo;t store cookies it will ask you every time.<\/p>\n\n<p><a href=\"https:\/\/x.com\/Freerunnering\/status\/1846921695803646147\">Kyle Howells<\/a>:<\/p>\n<blockquote cite=\"https:\/\/x.com\/Freerunnering\/status\/1846921695803646147\">\n<p>This is a worrying decree of platform lock-in.\nI expect a lot of issues when people lose access to their devices or try to login from a new computer.<\/p>\n<\/blockquote>\n\n<p>Currently, this is not an issue because Amazon allows both password and passkey access to the same account (thus negating some of the benefits of passkeys). But <a href=\"https:\/\/hachyderm.io\/@rmondello\/113325900747146333\">the goal<\/a> is for passkeys to <a href=\"https:\/\/hachyderm.io\/@rmondello\/113326316304694127\">replace<\/a> passwords, and some sites <a href=\"https:\/\/mastodon.social\/@fcloth\/113328742855382681\">already<\/a> prevent you from using both. So backup and transfer of passkeys are very important.<\/p>\n\n<p>Apple&rsquo;s Ricky Mondello <a href=\"https:\/\/hachyderm.io\/@rmondello\/113326246002234828\">has been<\/a> <a href=\"https:\/\/hachyderm.io\/@rmondello\/113325635947499007\">entertaining<\/a> <a href=\"https:\/\/mastodon.social\/@mjtsai\/113325659216552608\">my<\/a> <a href=\"https:\/\/mastodon.social\/@mjtsai\/113325661950156599\">questions<\/a> about this. My conclusion is that the current situation (pre-CXF and CXP) is not good. You have very little control over your passkeys and can easily get into trouble if something <a href=\"https:\/\/mastodon.social\/@mjtsai\/113325450635756619\">goes wrong<\/a>. There is always the option of using recovery, e.g. sending a special link to your e-mail, to generate a new passkey. Some people do this as a matter of course whenever they need to log in because they don&rsquo;t remember their passwords. This horrifies me, as I think of passwords more as irreplaceable secrets to be carefully guarded. Recovery via e-mail (or postal mail) does not easily scale to large numbers of logins, and I don&rsquo;t think it&rsquo;s very secure, as people often leave their mail open on an unlocked device. And, as passkeys replace passwords, it may be difficult to access your e-mail without a passkey, creating a circular problem.<\/p>\n\n<p>When Credential Exchange becomes available, I think it will help a lot, though I still have some concerns.<\/p>\n<p>The Passwords app seems unlikely to support <a href=\"https:\/\/mastodon.social\/@mjtsai\/113325659216552608\">backups<\/a> directly, so you would need to periodically export manually to maintain control of your data. Will this be <a href=\"https:\/\/mastodon.social\/@dimitribouniol\/113319122059978897\">limited<\/a>?<\/p>\n\n<p>As I suggested in the initial post, it <a href=\"https:\/\/hachyderm.io\/@rmondello\/113326291116646669\">will<\/a> <a href=\"https:\/\/hachyderm.io\/@rmondello\/113326321598726549\">be<\/a> possible to <a href=\"https:\/\/hachyderm.io\/@ezekiel\/113326276214991119\">write an app<\/a> that lets users truly export their data, not just transfer it. I was worried that, because sites can block certain authenticators, such an app might <a href=\"https:\/\/mastodon.social\/@mjtsai\/113328446368556088\">only be useful as a utility<\/a> and could not be used as an actual password manager. It seemed that this was being used to pressure KeePassXC into not allowing exports. However, <a href=\"https:\/\/mastodon.social\/@rmondello@hachyderm.io\/113328969915794772\">Mondello says<\/a> that the identification is &ldquo;extremely intentionally, an optional unattested hint string.&rdquo; In other words, like a Web browser&rsquo;s &ldquo;User-Agent,&rdquo; the password manager could identify itself however it wants.<\/p>\n\n<p>I still don&rsquo;t like that sites <a href=\"https:\/\/hachyderm.io\/@rmondello\/113328969781317462\">get to see<\/a> which password manager I&rsquo;m using. This is a privacy violation, as I doubt the big players are going to let me use a custom user agent. But if this is at least <em>possible<\/em> (in future versions or with indie password managers) it would prevent users from being locked out due to sites not liking a particular authenticator or big players going to war with each other.<\/p>\n\n<p>At this point, I would say that I&rsquo;m cautiously optimistic. However, the whole passkeys system is so complex that I&rsquo;m sure there are important questions that I don&rsquo;t even know to ask and failure modes I haven&rsquo;t considered.<\/p>\n\n<p><a href=\"https:\/\/mastodon.social\/@lapcatsoftware\/113328837586774101\">Jeff Johnson<\/a>:<\/p>\n<blockquote cite=\"https:\/\/mastodon.social\/@lapcatsoftware\/113328837586774101\"><p>The credential exchange protocol introduces phishing to passkeys.<\/p><p>What stops an attacker from tricking a victim into approving a transfer of passkeys to a credential provider under the control of the attacker? I&rsquo;ve read the working drafts, and they&rsquo;re appalling terse on the subject of security considerations.<\/p><\/blockquote>\n\n<p><a href=\"https:\/\/daringfireball.net\/linked\/2024\/10\/17\/dhh-argues-against-passkeys\">John Gruber<\/a> (<a href=\"https:\/\/mastodon.social\/@daringfireball\/113324721608671548\">Mastodon<\/a>):<\/p>\n<blockquote cite=\"https:\/\/daringfireball.net\/linked\/2024\/10\/17\/dhh-argues-against-passkeys\">\n<p>I don&rsquo;t have strong feelings about passkeys, but I am vaguely unsettled by them. There&rsquo;s no way to use passkeys without using a proper password manager, like Apple Passwords with iCloud Keychain, or 1Password. But if you&rsquo;re using a proper password manager, your passwords should all be unique and random, and you should have convenient access to 2FA codes. So what&rsquo;s the point of passkeys if they can only be used by people who are already using a good password manager? Perhaps the thinking is that too many users just can&rsquo;t be budged from the risky habit of using passwords they have memorized, and passkeys are a way to break that habit because they can&rsquo;t be memorized.<\/p>\n<\/blockquote>\n\n<p>The main <a href=\"https:\/\/hachyderm.io\/@rmondello\/113325716920073043\">benefits<\/a> vs. a password manager seem to be that users can be phished and <a href=\"https:\/\/mastodon.social\/@rmondello@hachyderm.io\/113325925973213056\">convinced<\/a> to bypass the safe auto-fill and that incompetent sites store unsalted passwords, which can then be leaked.<\/p>\n\n<p><a href=\"https:\/\/daringfireball.net\/linked\/2024\/10\/17\/fido-passkey-portability\">John Gruber<\/a> (<a href=\"https:\/\/mastodon.social\/@daringfireball\/113324930017423902\">Mastodon<\/a>):<\/p>\n<blockquote cite=\"https:\/\/daringfireball.net\/linked\/2024\/10\/17\/fido-passkey-portability\">\n<p>A friend texted me with another argument <em>for<\/em> passkeys: it&rsquo;s somewhat common for websites to break password autofill. Maybe it&rsquo;s deliberate, in the name of fighting bots? But whether deliberate or not, with passkeys, they <em>have<\/em> to work with your browser&rsquo;s connected password manager. So maybe passkeys are a net win for convenience, even for technically-knowledgeable users who are unlikely to fall for phishing scams.<\/p>\n<\/blockquote>\n\n<p>They are also more convenient than 2FA.<\/p>\n\n<p><a href=\"https:\/\/mastodon.social\/@alex@tech.lgbt\/113328514437337744\">Alex R<\/a>:<\/p>\n<blockquote cite=\"https:\/\/mastodon.social\/@alex@tech.lgbt\/113328514437337744\">\n<p>I think a lot of the passkey discourse(&trade;) comes about because we&rsquo;re a cohort of highly technical early adopters who already have password managers set up with sync, autofill, and two-factor auth. For those users, passkeys might lack some features (although I think the gaps are being filled rapidly there), but they aren&rsquo;t really the people for whom passkeys are a big improvement.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/mastodon.social\/@opoto\/113329231464897568\">opoto<\/a>:<\/p>\n<blockquote cite=\"https:\/\/mastodon.social\/@opoto\/113329231464897568\">\n<p>From the other side of this correct consideration, the point is to explain to the non tech users that from now they will need to use a password\/passkey manager. This introduces complexity for them.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/mastodon.social\/@arroz\/113326872057377646\">Miguel Arroz<\/a>:<\/p>\n<blockquote cite=\"https:\/\/mastodon.social\/@arroz\/113326872057377646\"><p>A bit of feedback: the main problem to me is not the security factor (passkeys are more secure than passwords, period) but the apparent lack of control and ownership of my credentials.<\/p><p>[&#8230;]<\/p><p>Why is an Apple platform, macOS, seemingly intentionally hiding my own credential to my Apple account, at least in the Passwords app?<\/p><\/blockquote>\n\n<p id=\"passkeys-credential-exchange-update-2024-10-23\">Update (2024-10-23): See also: <a href=\"https:\/\/x.com\/ditheringfm\/status\/1848710300717224308\">Dithering<\/a>.<\/p>\n\n<p id=\"passkeys-credential-exchange-update-2024-11-05\">Update (2024-11-05): <a href=\"https:\/\/mastodon.social\/@invalidname\/113426443070212969\">Chris Adamson<\/a>:<\/p>\n<blockquote cite=\"https:\/\/mastodon.social\/@invalidname\/113426443070212969\"><p>Cool new bits that just went up in AuthenticationServices: <a href=\"https:\/\/developer.apple.com\/documentation\/authenticationservices\/ascredentialexportmanager\">ASCredentialExportManager<\/a> and <a href=\"https:\/\/developer.apple.com\/documentation\/authenticationservices\/ascredentialimportmanager\">ASCredentialImportManager<\/a>. This will allow password manager apps on macOS\/iOS\/visionOS to exchange credentials like passwords and passkeys. Cool thing is, OS acts as an intermediary between the two apps, and none of your credentials are written to the filesystem mid-flight.<\/p><\/blockquote>\n<p>They are Swift-only.<\/p>","protected":false},"excerpt":{"rendered":"<p>Filipe Esp&oacute;sito (Hacker News, MacRumors, Dan Moren): As just announced by the FIDO Alliance, the new specifications aim to promote user choice by offering a way to import and export passkeys. The draft of the new specifications establishes the Credential Exchange Protocol (CXP) and Credential Exchange Format (CXF) formats for transferring not only passkeys, but [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2024-10-16T18:04:47Z","apple_news_api_id":"25448c07-6211-4954-ae75-c5043bab8034","apple_news_api_modified_at":"2024-11-05T19:10:34Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAADg==","apple_news_api_share_url":"https:\/\/apple.news\/AJUSMB2IRSVSudcUEO6uANA","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[284,2165,1417,31,2193,30,2222,981,1200,355,48,1227,2090,96],"class_list":["post-45393","post","type-post","status-publish","format-standard","hentry","category-technology","tag-1password","tag-apple-password-manager","tag-icloud-keychain","tag-ios","tag-keepass","tag-mac","tag-passkeys","tag-passwords","tag-phishing","tag-privacy","tag-security","tag-top-posts","tag-two-factor-authentication-2fa","tag-web"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/45393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=45393"}],"version-history":[{"count":16,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/45393\/revisions"}],"predecessor-version":[{"id":45670,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/45393\/revisions\/45670"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=45393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=45393"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=45393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}