• 1 Post
  • 164 Comments
Joined 11 months ago
cake
Cake day: December 14th, 2023

help-circle





  • BakedCatboy@lemmy.mltoSync for Lemmy@lemmy.worldI quit.
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    12 days ago

    The thing is the missing comments are all in English, and they affect entire posts and not just certain commenters so it probably isn’t related to the language setting for individual comments, otherwise only certain comments would be missing and not the whole thread. Plus I already have all languages enabled. As a test I also found one commenter from an empty thread and viewed other posts they commented on and both their comment and everyone else’s showed up. If it was related to people marking their comments wrong I would expect it to affect their comments on other threads too.

    I’m curious if the problematic posts are the same for others, for example this thread with 60+ comments is one that shows empty in sync but with the correct comment count: https://lemmy.ml/post/22091314

    And this post too with ~20 comments, also all in English: https://lemmy.ml/post/22089346

    I double checked and my account settings on the web UI have all languages selected, and sync even shows the correct count for comments, just doesn’t display any of them.






  • I’m hoping and assuming that apps would need to ask for permission to use this, lest this turn into every app fighting to push their own dynamic island notification to the top bar, just like how back then every app wanted to have its own persistent notification and also that time when every app provided minor status updates using global toasts that didn’t specify which app created it, so you could be doing something in a completely different app and you’d get a completely random and unattributed toast with some vague message like “connection failed” with no way outside of third party apps to figure out which app sent it. /rant






  • The key difference is that during normal use, the private key of the passkey doesn’t leave the device (or password manager). The passkey basically comes in 2 parts, the public and private (secret) part. In order to log in, the website presents a cryptographic challenge that is only solvable using your private key - and crucially you can solve the challenge without revealing your private key. An attacker could get your answer to the challenge and still be unable to solve additional challenges without the private part of your passkey.

    This of course makes it basically impossible to manually log in using a passkey and a keyboard, without any password manager to do the cryptographic calculations (unless you have a LOT of paper and time), but the security advantage of making it near impossible to be phished is generally regarded as a net positive. In order to steal a passkey there would need to be a vulnerability in the software, since passkeys make it much harder to trick a user into giving it away (since tricking the user into logging in on a fake website doesn’t work due to the aforementioned cryptography, the main way to steal a passkey would be to trick the user into exporting it - which is a much higher bar).


  • If you mean the “passkeys” that are becoming popular as a “password replacement”, it’s basically speaking a public private keypair. What makes it more secure is that, under normal conditions (aside from backing up the passkey), the private “secret” part of the keypair never leaves the app or device it’s stored on. It’s only used temporarily to sign messages and prove that you have the secret key, unlike a password which needs to be sent securely to a server to validate.

    You could in theory store a backup on a USB drive but since passkeys are new, it highly depends on the password manager you use to store the passkey. Since passkeys are more complex than something you can memorize/type, it has to be stored in a password manager of some sort to be useful, so you would need to check that password manager allows backing up passkeys. There is currently work being done to standardize the formats/protocols to transfer passkeys so it seems this is very much up in the air. For example, I use BitWarden which stores passkeys, but it seems like I can only add or delete passkeys to an entry, not export them and apparently they get exported with the passwords when the vault is exported. BitWarden also syncs your vault to every logged in device though so you could see that as a form of backup. Going one step further, even though BitWarden doesn’t have a passkey export/backup feature yet (in addition to Bitwarden’s vault export), the self-hosted server also stores all your passwords including passkeys in regular files which also can be backed up (this is how I back up my VaultWarden instance) - although it would probably be hard to use that backup in any other way besides restoring it onto a BitWarden server instance.

    Edit: I didn’t realize passkeys were exported with the vault export, since I haven’t used it and noticed that editing an entry doesn’t allow you to view passkey data - only remove, updated my comment to reflect that.