You said:
ChatGPT said:

Passkeys and passwords both let you sign in—but they work very differently under the hood.

Passwords (the traditional way)

  • What you enter: A secret string you memorize (or reuse 😬).
  • How it works: The site stores a verifier of your password. When you log in, it checks whether what you typed matches.
  • Weak points:
    • Phishing (you can be tricked into typing it on a fake site)
    • Reuse across sites (one breach → many accounts)
    • Guessing/brute force if passwords are weak
  • User burden: You must remember, manage, and periodically change them.

Passkeys (the modern way)

  • What you use: A cryptographic key pair tied to your device/account.
  • How it works:
    • Your device creates a public key (shared with the site) and a private key (never leaves your device).
    • To sign in, your device proves it has the private key—often unlocked with Face ID, Touch ID, or a device PIN.
  • Strong points:
    • Phishing-resistant (the key only works for the real site)
    • No shared secrets stored on servers
    • Nothing to remember or type
  • User experience: Tap → authenticate → done.
https://s3.amazonaws.com/com.twilio.prod.twilio-docs/original_images/19DfiKodi3T25Xz7g9EDTyvF9di2SzvJo6JebRJaCN-1P_c1fMqGtrAyZzxGGucG0bcmR8UwNes-gS?utm_source=chatgpt.com

Side-by-side summary

FeaturePasswordsPasskeys
Secret shared with siteYesNo
Vulnerable to phishingHighExtremely low
Reused across sitesOftenNever
Relies on memoryYesNo
Uses biometricsOptionalCommon
Backed by cryptographyIndirectCore design

Why passkeys are a big deal

Think of passwords as keys you copy and hand out, hoping no one duplicates them.
Passkeys are locks that only respond to your key, which never leaves your pocket.


You said:
ChatGPT said:

Brad, that story is outstanding 😄

And painfully accurate.

Your Ph.D. student wasn’t wrong — when you learn language academically, vocabulary feels flat. “Authenticate” and “prove” feel interchangeable. But to a normal human reader, they absolutely are not.

So let’s do this properly.

No seals.
No cryptography.
No “challenge-response.”
No digital signature.

Just kindergarten-day language.


Blog Version — Actually Simple

For years, logging into a website meant typing a password.

That password is a secret you share with the website.
If someone else learns it, they can pretend to be you.

Passkeys work differently.

When you create a passkey, your device makes something like a unique digital fingerprint. The website gets a copy of the public part of that fingerprint. Your device keeps the private part locked inside.

When you log in, the website sends your device a quick test.
Your device answers that test using its private fingerprint.

The website checks the answer against the public copy it has.

If it matches, you’re in.

You never type anything.
You never send a secret across the internet.
And the website never stores something that could be stolen and reused.


The Big Difference

Passwords prove:

“I know the secret.”

Passkeys prove:

“This is my device.”

That’s it.


Why This Matters

With passwords:

  • People reuse them.
  • Fake websites trick people into typing them.
  • Databases get hacked.
  • Attackers replay stolen credentials.

With passkeys:

  • There is no secret to type.
  • Fake websites can’t trick the device.
  • Stolen database information can’t be reused.
  • Nothing can be replayed.

An attacker would need your actual device — and even then, they still have to unlock it.


And if I were there on that kindergarten day, I’d tell your student’s daughter:

“A password is like telling the teacher a secret word.
A passkey is like the teacher recognizing your face.”

If you want, I can also explain:

  • how passkeys sync across devices safely,
  • what happens if you lose a phone,
  • or how this fits into zero-trust / audit-friendly security models (which I know is right up your alley).
You said:
ChatGPT said:

Great—let’s take all three, clearly and practically, and tie them together.

https://cdn.buttercms.com/xSMibgN5QsSyT3DVRZQq?utm_source=chatgpt.com
https://cdn.prod.website-files.com/65e95b064168fb52387963b3/68be5cb7ad1671344f40166d_How%20do%20passkeys%20work%3F%20The%20registration%20process%20diagram.png?utm_source=chatgpt.com
https://storage.googleapis.com/gweb-uniblog-publish-prod/images/Chrome_Passkeys_Blog-Header_2096x1182-02_SS.width-1300.png?utm_source=chatgpt.com

5


1️⃣ How passkeys sync across devices (safely)

Passkeys are built on public-key cryptography and standardized by the FIDO Alliance and World Wide Web Consortium.

What actually syncs

  • Private keys are:
    • Encrypted end-to-end
    • Stored only inside secure hardware (Secure Enclave / TPM)
  • Public keys live on the website’s server and are harmless on their own

Ecosystem examples

  • Apple iCloud Keychain
  • Google Password Manager
  • Microsoft Windows Hello

Your cloud account cannot log in as you—it can only deliver encrypted material to a device you’ve already proven control of.

In audit terms: the cloud provider is a custodian, not an actor.


2️⃣ What happens if you lose your phone

This is the most common (and reasonable) concern.

Best-case (most users today)

  1. You get a new device
  2. Sign into your platform account (Apple ID / Google / Microsoft)
  3. Authenticate using account recovery (ID, recovery contact, or recovery key)
  4. Passkeys reappear—still bound to you

Security fallback layers

  • Secondary trusted devices (laptop, tablet)
  • Hardware security keys (USB-C / NFC)
  • Recovery codes (store offline—like legal documents)

Worst-case scenario

If you lose all devices and fail account recovery:

  • You reset accounts individually (like today with passwords)
  • The difference: no attacker can exploit your loss

Loss causes inconvenience, not compromise—a fundamental shift from passwords.


3️⃣ Passkeys in Zero-Trust & audit-friendly security

This is where passkeys quietly shine.

Zero-Trust alignment

Zero-trust assumes:

  • No network is trusted
  • No identity is trusted without proof
  • Every authentication is contextual

Passkeys provide:

  • ✔ Cryptographic identity (not knowledge-based)
  • ✔ Device binding
  • ✔ Origin binding (phishing resistance)
  • ✔ Strong non-repudiation properties

Audit & governance benefits

From an accounting / IS perspective:

Control AreaPasswordsPasskeys
Shared secretsYes (risk)None
Credential reuseCommonImpossible
Phishing lossesHighNear-zero
Authentication logsAmbiguousCryptographically provable
MFA layeringBolted-onNative

This maps cleanly into:

  • SOC 2
  • ISO 27001
  • NIST SP 800-63B
  • Modern identity-centric internal controls

In plain terms: passkeys convert authentication from behavioral trust to mathematical proof.


One-sentence mental model

Passwords ask: “Do you know the secret?”
Passkeys ask: “Can you prove you’re the same cryptographic entity as last time?”


If you’d like, next we can:

  • walk through a real login flow packet-by-packet, or
  • compare passkeys vs hardware tokens vs smart cards, or
  • map passkeys directly into an enterprise ICS / incident-response model (your comms diagrams immediately come to mind).
You said:
ChatGPT said:

Passkey login flow (step-by-step, wire-clean)

https://www.descope.com/_next/image?q=75&url=https%3A%2F%2Fimages.ctfassets.net%2Fxqb1f63q68s1%2F6kq4tXbMcr9kNvUgi8NNGU%2F3e8c30e7ba7df98bc74ed0f3e26c2661%2FPasskey_authentication_ceremony-min.png&w=1920&utm_source=chatgpt.com
https://images.ctfassets.net/23aumh6u8s0i/2xxX1F2zya0XdsiCRz5dXk/3c3350168175e59b2e41be8afda3e9fd/2-Registration.png?utm_source=chatgpt.com
https://www.researchgate.net/publication/361490731/figure/fig2/AS%3A11431281079346601%401660647485118/Public-Key-Challenge-Response-authentication.png?utm_source=chatgpt.com

Below is the exact sequence that happens when you tap “Sign in with passkey.” I’ll contrast it with passwords where helpful.


0️⃣ One-time registration (already done)

When you first created a passkey for a site:

  • Your device generated a key pair:
    • Private key → stays in secure hardware (Secure Enclave / TPM)
    • Public key → sent to the website
  • The site stored:
    • Your account ID
    • Your public key
    • Metadata (device type, last used, etc.)

No secrets were shared.


1️⃣ Login request (browser → server)

You open the real website and click Sign in.

The server responds with:

  • random challenge (nonce)
  • The site identity (origin / domain)
  • Allowed credentials (your registered public key IDs)

This challenge is single-use and expires quickly.


2️⃣ Browser hands off to the authenticator

Your browser asks the OS:

“Do you have a passkey for this exact domain?”

The OS verifies:

  • Domain matches exactly (no phishing look-alikes)
  • A valid passkey exists

If yes, control passes to the authenticator.


3️⃣ User presence & verification (local)

You confirm locally:

  • Face ID / Touch ID / fingerprint
  • Or device PIN

Important:

  • Biometrics never leave the device
  • They unlock the private key, not the website

4️⃣ Cryptographic proof is created

Inside secure hardware:

  • The device signs:
    • The server’s challenge
    • The site’s origin
  • Using:
    • Your private key

Result:

  • digital signature
  • Plus minimal metadata (counter, device flags)

The private key never exits hardware.


5️⃣ Assertion sent to the server

The browser sends back:

  • The signed challenge
  • The credential ID
  • The signature

No secrets. No reusable data.


6️⃣ Server verification (milliseconds)

The server:

  1. Looks up your public key
  2. Verifies the signature
  3. Confirms:
    • Challenge matches
    • Origin matches
    • Signature is valid

✅ If all checks pass → login succeeds

❌ If anything is off → hard fail


What cannot happen (by design)

AttackWhy it fails
PhishingSignature only works for the real domain
ReplayChallenge is one-time
Credential stuffingNo shared secrets
Server breachPublic keys are useless alone
MITMOrigin is cryptographically bound

Password flow (for contrast)

Passwords:

  1. You type a secret
  2. Secret crosses the network
  3. Server compares stored verifier
  4. Attacker can replay, phish, or reuse

Passkeys:

  • You prove possession, not knowledge
  • Nothing reusable ever travels

Audit-friendly framing

From a controls perspective:

  • Authentication event = verifiable cryptographic assertion
  • User intent = biometric / PIN gate
  • Non-repudiation = strong (device-bound + counter)
  • Evidence quality ≫ password + MFA OTP

This is why standards bodies like the  pushed passkeys so hard—they replace policy with math.


One-line summary

A passkey login is a signed, domain-locked cryptographic challenge—unphishable, non-replayable, and locally authorized.

If you want next, I can:

  • show a packet-level message list (challenge → assertion),
  • diagram cross-device login (QR-based handoff),
  • or map this directly into SOC / incident response evidence trails.
You said:
ChatGPT said:

That concern is reasonable—and it’s exactly the right threat model to question.
The short answer is: passkeys dramatically reduce risk, but they don’t rely on “perfect devices.” They are designed so that even a hacked device has very hard limits. Let’s unpack this carefully.

https://help.apple.com/assets/663BFE394E05E4CA5D0A02DC/663BFE3C4E05E4CA5D0A02E8/en_US/9302f62027e1966222080ef2731e45de.png?utm_source=chatgpt.com
https://www.researchgate.net/publication/260635071/figure/fig3/AS%3A667663323889671%401536194749602/Logical-diagram-of-a-trusted-platform-module-TPM-showing-the-cryptographic-components.png?utm_source=chatgpt.com
https://miro.medium.com/v2/resize%3Afit%3A1400/1%2AoRHNajU9MK1dgC2NH-s5ew.png?utm_source=chatgpt.com

4


The key misconception (very common, very understandable)

“If my device is hacked and my biometrics are stolen, the attacker gets the private key.”

That is not how passkeys work.
There is no point in the system where all three are extractable:

  • private key
  • biometric template
  • signing capability

1️⃣ What actually happens on the device

Private key

  • Generated inside secure hardware (Secure Enclave / TPM)
  • Non-exportable by design
  • Cannot be read, copied, or dumped—even by the OS kernel

Biometrics

  • Stored as templates, not images
  • Live in a separate biometric subsystem
  • Never leave the device
  • Never accessible to apps, browsers, or websites

Critical detail

Biometrics do NOT unlock the private key directly.

They authorize the secure hardware to perform one operation only:

“Sign this challenge for this origin.”

No raw key access is ever granted.


2️⃣ What “device hacked” really means (threat tiers)

Let’s distinguish attack levels.

🟡 Malware / app compromise (most common)

  • Attacker can:
    • Read files
    • Spy on screen
    • Inject browser scripts
  • Attacker cannot:
    • Extract private key
    • Bypass origin binding
    • Trigger silent signatures without user presence

👉 Passkeys defeat this class outright.


🟠 OS-level compromise (rare, expensive)

  • Attacker controls the OS
  • Still blocked because:
    • Secure Enclave / TPM enforces key isolation
    • Signing requires hardware authorization
    • Origin binding is enforced at the authenticator

👉 Attacker might lock you out, but still can’t steal credentials.


🔴 Hardware-level attack (nation-state tier)

This is the only class where your concern becomes theoretically valid.

To succeed, an attacker must:

  1. Physically possess the device
  2. Defeat secure hardware isolation
  3. Bypass biometric liveness checks
  4. Subvert rate limits & counters
  5. Do all of this without detection

At this point:

  • Passwords
  • OTP apps
  • SMS
  • Smart cards

…are all equally compromised or worse.

This is beyond consumer or even enterprise threat models.


3️⃣ Why stealing biometrics doesn’t help attackers

Even perfect biometric theft does not give attackers:

  • The private key
  • The ability to replay logins
  • The ability to authenticate on another device
  • The ability to bypass origin binding

Biometrics are only a local gate—not a credential.

Think of it this way:

A fingerprint is the doorbell, not the key.


4️⃣ Why this is still safer than passwords + MFA

ScenarioPasswordsPasskeys
Phishing❌ trivial✅ impossible
Database breach❌ reusable✅ useless
Malware❌ keylogging✅ blocked
Credential replay❌ yes✅ no
Device theft❌ full compromise⚠ limited
Remote attacker❌ easy✅ stopped

Passkeys collapse the attack surface from “anywhere on the internet” to “physical possession + hardware defeat.”


5️⃣ How standards bodies modeled this risk

The  explicitly designed passkeys under the assumption that:

  • Servers will be breached
  • Users will be phished
  • Malware will exist

They accepted physical hardware compromise as the outer boundary—because no scalable defense exists beyond that.


6️⃣ The honest bottom line

You’re right about one thing:

Passkeys don’t make devices invincible.

But they change failure modes:

  • Passwords fail silently and remotely
  • Passkeys fail locally and loudly

Or in audit language:

Passkeys convert authentication risk from systemic to situational.


One-sentence summary

To steal a passkey, an attacker must defeat secure hardware and user presence—whereas passwords fall to phishing, reuse, or leaks.

Posted in

Leave a comment