How passkeys prevent Phishing attacks
Passkeys are tied to specific (https) websites. Browsers won't use a private key intended for one website to sign a challenge generated by a different site.
Phishing attacks are one of the easiest, yet most devastating vectors of attack. Even the “green bar” EV SSL concept failed to prevent phishing attacks. The fundamental issue is users themselves.
We all log in to countless websites and apps every day, especially in post covid hybrid working environments where personal and professional is a bit blured. The truth is that we’re all too busy (or disinterested) to check the SSL certificate of every site we visit.
Browser enforcement
Passkeys solve this problem and close the attack vector. Because passkeys are managed by the browser, the browser can check the target website. Each passkey is tied to a specific website, and browsers won’t use a passkey for one site to sign a challenge generated by a different site.
It’s a bit more complex than this, because passkeys use something similar to the cookie domain concept. i.e. a passkey generated for example.com could be used on example.com and login.example.com, but one generated for login.example.com could not be used on app.example.com.
Happy days 😊