Unpacking Passkeys Pwned: Possibly the Most Specious Research in Decades
Posted4 months agoActive4 months ago
Original: Unpacking Passkeys Pwned: Possibly the most specious research in decades
arstechnica.comSecuritystory
heatednegative
Debate
80/100
PasskeysSecurity ResearchDigital Authenticity
Key topics
Passkeys
Security Research
Digital Authenticity
Discussion Activity
Light discussionFirst comment
1h
Peak period
1
0-3h
Avg / period
1
Key moments
- 01Story posted
Aug 30, 2025 at 11:43 AM EDT
4 months ago
Step 01 - 02First comment
Aug 30, 2025 at 12:43 PM EDT
1h after posting
Step 02 - 03Peak activity
1 comments in 0-3h
Hottest window of the conversation
Step 03 - 04Latest activity
Sep 1, 2025 at 9:09 AM EDT
4 months ago
Step 04
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
ID: 45075589Type: storyLast synced: 11/17/2025, 8:01:31 PM
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.
For now I'll continue opting for a strong password with a TOTP 2FA. TOTP (RFC 6238) doesn't have any of the device dependency and vendor issues listed above. It's simple and straightforward, something I can grok well enough to stay safe.