包阅导读总结
1. 关键词:Passkeys、Passwords、User Experience、Authentication、Security
2. 总结:原本计划采用 passkeys 但因用户体验差放弃。Passkeys 后端处理复杂,存在平台绑定等问题致使用户易无法访问账号,不如教用户用跨平台密码管理器。若需额外安全层,可依赖邮件首次登录新设备。最终决定坚持用密码和邮件。
3. 主要内容:
– 原本计划在 ONCE/Campfire 全面使用 passkeys,构建了早期认证系统
– 但处理 passkeys 后端复杂,用户体验糟糕,最终放弃
– Passkeys 存在问题,类似密码管理器但与特定平台绑定,用户易无法访问账号
– 如在不同设备使用会受限,解决方案繁琐
– 相比之下,密码虽有问题但 passkeys 目前并非更好选择
– 依赖邮件首次登录新设备是不错的替代方案
– 最终决定坚持用密码和邮件,鼓励但不强制 2FA 和密码管理器
思维导图:
文章地址:https://world.hey.com/dhh/passwords-have-problems-but-passkeys-have-more-95285df9
文章来源:world.hey.com
作者:David Heinemeier Hansson
发布时间:2024/9/9 16:35
语言:英文
总字数:587字
预计阅读时间:3分钟
评分:83分
标签:密码钥匙,用户体验,身份验证,安全性,密码管理器
以下为原文内容
本内容来源于用户推荐转载,旨在分享知识与观点,如有侵权请联系删除 联系邮箱 media@ilingban.com
We had originally planned to go all-in on passkeys for
ONCE/Campfire
, and we built the early authentication system entirely around that. It was not a simple setup! Handling passkeys properly is surprisingly complicated on the backend, but we got it done. Unfortunately, the user experience kinda sucked, so we ended up ripping it all out again.
The problem with passkeys is that they’re essentially a halfway house to a password manager, but tied to a specific platform in ways that aren’t obvious to a user at all, and liable to easily leave them unable to access of their accounts. Much the same way that two-factor authentication can do, but worse, since you’re not even aware of it.
Let’s take a simple example. You have an iPhone and a Windows computer. Chrome on Windows stores your passkeys in Windows Hello, so if you sign up for a service on Windows, and you then want to access it on iPhone, you’re going to be stuck (unless you’re so forward thinking as to add a second passkey, somehow, from the iPhone will on the Windows computer!). The passkey lives on the wrong device, if you’re away from the computer and want to login, and it’s not at all obvious to most users how they might fix that.
Even in the best case scenario, where you’re using an iPhone and a Mac that are synced with Keychain Access via iCloud, you’re still going to be stuck, if you need to access a service on a friend’s computer in a pinch. Or if you’re not using Keychain Access at all. There are plenty of pitfalls all over the flow. And the solutions, like scanning a QR code with a separate device, are cumbersome and alien to most users.
If you’re going to teach someone how to deal with all of this, and all the potential pitfalls that might lock them out of your service, you almost might as well teach them how to use a cross-platform password manager like 1password.
Yes, passwords have problems. If you’re using them without a password manager, you’re likely to reuse them across multiple services, and if you do, all it takes is one service with awful password practices (like storing them in plain text rather than hashing them with something like bcrypt), and a breach will mean hackers might get access to all your other services.
But just because we have a real problem doesn’t mean that all proposed solutions are actually going to be better. And at the moment, I don’t see how passkeys are actually better, and, worse still, can become better. Unless you accept the idea that all your passwords should be tied to one computing ecosystem, and thus make it hard to use alternative computers.
A decent alternative to passkeys, if you need the extra layer of security, is to lean on email for the first login from a new device. Treating email as a second factor, but only on the first login from that device. Everyone has email, everyone understands email. (Just don’t force us all to go through magic links exclusively, as that’s a pain too for those who’ve actually adopted a password manager!).
Bottom line, I’m disappointed to report that passkeys don’t appear worth the complexity of implementation (which is substantial!) nor the complexity and gotchas of the user experience. So we’re sticking to passwords and emails. Encouraging opt-in 2FA and password managers, but not requiring them.
Passkeys seemed promising, but not all good intentions result in good solutions.