Passseeds – Hijacking Passkeys to Unlock New Cryptographic Use Cases
Key topics
The debate around "PassSeeds" centers on repurposing passkeys as cryptographic seed material, sparking a lively discussion about the terminology used to describe this concept. While the author, csuwldcat, admits to using the term "hijacking" to poke fun at the Passkeys team they worked with at Microsoft, others argue it's misleading and worrying, causing confusion among readers and even AI summarization tools. As commenters weigh in, some highlight existing use cases, like Peanut.me's non-custodial crypto wallets, while others question the advantages over traditional password management or YubiKey's features, prompting csuwldcat to clarify the benefits of automatic syncing across devices. The thread is relevant now as it challenges conventional thinking around passkeys and cryptographic key management.
Snapshot generated from the HN discussion
Discussion Activity
Active discussionFirst comment
N/A
Peak period
12
0-1h
Avg / period
3.2
Based on 29 loaded comments
Key moments
- 01Story posted
Jan 6, 2026 at 7:50 PM EST
3d ago
Step 01 - 02First comment
Jan 6, 2026 at 7:50 PM EST
0s after posting
Step 02 - 03Peak activity
12 comments in 0-1h
Hottest window of the conversation
Step 03 - 04Latest activity
Jan 7, 2026 at 11:40 AM EST
2d ago
Step 04
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.
I’ll leave the details to the blog post, but here’s a short list of what PassSeeds enable:
- Need a user-custodied BLS12-381 key to engage in more advanced ZKP Verifiable Credential / proofing flows? Say less, you're covered.
- Want to create a petty cash Web wallet for Bitcoin transactions that relies on a secp256k1 key? Ask and ye shall receive.
- How about keys for decentralized social media identifiers and post signing that are of a type other than P-256? No problem, I got you!
On a tangent, in the process I learnt that Firefox (at least on desktop) now has an "AI preview" feature where if you long-press on a URL, it brings up the pop-up. The first time, it notifies that the "AI" processing is local-only to preserve privacy.
[1]: Screenshot 2026-01-06 at 6.33.27 PM.png https://drive.google.com/file/d/15z--Oimct30QLuxR03nxMz9H_3L...
In general, using a key for a purpose it was not designed for gets you into trouble. Treating a public key as private key seed material is almost certainly going to be a problem. Systems are just not designed to keep public keys secret, even if webauth does.
Would KDF(deterministic_sign(“well-known message”)) not also provide valid entropy?
Is it just impossible to force a nonce for a deterministic signature?
Also, the "ECDSA Public Key Recovery" picture makes me suspect this is AI slop.
I did use AI for the ECDSA public key recovery diagram, because I wasn't about to spend hours hand rolling that in Lunacy. It's correct in broad strokes, and anyone who wants to understand it more deeply can just look at the code, imo.
Why not just use those?
Edit: that's what I get for not reading far enough -- the article addresses this, though I would quibble with the confident assertion that the extensions are not available in major browsers, given I worked for a startup literal years ago which built major functionality on top of these extensions, which were available in (at least) all relevant mobile browsers.
Ironically, you could make a pollyfill for the PRF functionality with this.
https://caniuse.com/mdn-api_credentialscontainer_get_publick...
https://caniuse.com/mdn-api_credentialscontainer_get_publick...
Apologies for the brash statement earlier; that was wrong of me.
The inability to use a passkey for the purposes of both authentication and secret storage (at least, without building non-trivial additional cryptographic plumbing) seems to me a reason to just use and push for the continued adoption and acceleration of the purpose-built extensions, instead of reusing a _public_ key as private material.
when the entire point of the token is to guard the private key, and make the public key accessible
A cryptographic seed is one of the most sensitive things. And here you choose to expose it to a website. This is not something you do for authentication. The only reason to do this is to have javascript/wasm on a website perform sensitive cryptographic operations for you. You should not ever be doing this.
Applications such as a password manager can already integrate entropy from a passkey to secure their key-database using the Challenge-Response protocol: https://docs.yubico.com/yesdk/users-manual/application-otp/c...
Error: The operation either timed out or was not allowed. See: https://www.w3.org/TR/webauthn-2/#sctn-privacy-consideration....
On Android
3 more comments available on Hacker News