Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Middle East conflict casts shadow of global ad outlook

    Customer reviews become a key battleground as AI revolutionizes product discovery

    In graphic detail: Middle-tier creators are fueling the next phase of the creator economy

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      What the polls say about how Americans are using AI

      February 27, 2026

      Tensions between the Pentagon and AI giant Anthropic reach a boiling point

      February 21, 2026

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026
    • Business

      The team behind continuous batching says your idle GPUs should be running inference, not sitting dark

      March 13, 2026

      Met Office ‘supercomputing as a service’ one year old

      March 12, 2026

      Tech hiring evolves as candidates ask for AI compute alongside pay and perks

      March 11, 2026

      Oracle is spending billions on AI data centers as cash flow turns negative

      March 11, 2026

      Google: Cloud attacks exploit flaws more than weak credentials

      March 10, 2026
    • Crypto

      Banks Respond to Kraken’s Federal Reserve Access as Trump Sides with Crypto

      March 4, 2026

      Hyperliquid and DEXs Break the Top 10 — Is the CEX Era Ending?

      March 4, 2026

      Consensus Hong Kong 2026: The Institutional Turn 

      March 4, 2026

      New Crypto Mutuum Finance (MUTM) Reports V1 Protocol Progress as Roadmap Enters Phase 3

      March 4, 2026

      Bitcoin Short Sellers Caught Off Guard in New White House Move

      March 4, 2026
    • Technology

      Middle East conflict casts shadow of global ad outlook

      March 13, 2026

      Customer reviews become a key battleground as AI revolutionizes product discovery

      March 13, 2026

      In graphic detail: Middle-tier creators are fueling the next phase of the creator economy

      March 13, 2026

      The Future of Marketing Briefing: a war, an oil spike and an ad market that can’t see what comes next

      March 13, 2026

      As AI creative moves upstream, one production firm is pitching brands a model built on that trend

      March 13, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Don’t use passkeys for encrypting user data
    Technology

    Don’t use passkeys for encrypting user data

    TechAiVerseBy TechAiVerseFebruary 28, 2026No Comments4 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Don’t use passkeys for encrypting user data
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Don’t use passkeys for encrypting user data

    Why am I writing this today?
    Because I am deeply concerned about users losing their most sacred data.

    Over the past year or two, I’ve seen many organizations, large and small, implement passkeys (which is great, thank you!) and use the PRF (Pseudo-Random Function) extension to derive keys to protect user data, typically to support end-to-end encryption (including backups).
    I’ve also seen a number of influential folks and organizations promote the use of PRF for encrypting data.

    The primary use cases I’ve seen implemented or promoted so far include:

    • encrypting message backups (including images and videos)
    • end-to-end encryption
    • encrypting documents and other files
    • encrypting and unlocking crypto wallets
    • credential manager unlocking
    • local account sign in

    Why is this a problem?

    When you overload a credential used for authentication by also using it for encryption, the “blast radius” for losing that credential becomes immeasurably larger.

    Imagine a user named Erika. They are asked to set up encrypted backups in their favorite messaging app because they don’t want to lose their messages and photos, especially those of loved ones who are no longer here.
    Erika is prompted to use their passkey to enable these backups.

    There is nothing in the UI that emphasizes that these backups are now tightly coupled to their passkey. Even if there were explanatory text, Erika, like most users, doesn’t typically read through every dialog box, and they certainly can’t be expected to remember this technical detail a year from now.

    A few months pass, and Erika decides to clean up their credential manager. They don’t remember why they had a specific passkey for a messaging app and deletes it.

    Fast forward a year: they get a new phone and set up the messaging app. They aren’t prompted to use a passkey because one no longer exists in their credential manager. Instead, they use phone number verification to recover their account. They are then guided through the “restore backup” flow and prompted for their passkey.

    Since they no longer have it, they are informed that they cannot access their backed up data. Goodbye, memories.

    Here’s a few examples of what a user sees when they delete a passkey:

    Example: deleting a passkey in Apple Passwords
    Example: deleting a passkey in Google Password Manager
    Example: deleting a passkey in Bitwarden

    How is a user supposed to understand that they are potentially blowing away photos of deceased relatives, an encrypted property deed, or their digital currency?

    We cannot, and should not, expect users to know this.

    At this point, you may be asking why PRF is part of WebAuthn in the first place.
    There are some very legitimate and more durable uses of PRF in WebAuthn, specifically supporting credential managers and operating systems.

    A passkey with PRF can make unlocking your credential manager (where all of your other passkeys and credentials are stored) much faster and more secure.
    Credential managers have robust mechanisms to protect your vault data with multiple methods, such as master passwords, per-device keys, recovery keys, and social recovery keys.
    Losing access to a passkey used to unlock your credential manager rarely leads to complete loss of your vault data.

    PRF is already implemented in WebAuthn Clients and Credential Managers, so the cat is out of the bag. My asks:

    • To the wider identity industry: please stop promoting and using passkeys to encrypt user data. I’m begging you. Let them be great, phishing-resistant authentication credentials.

    • To credential managers: please prioritize adding warnings for users when they delete a passkey with PRF (and displaying the RP’s info page when available)

    • To sites and services using passkeys: if you still need to use PRF knowing these concerns, please:

      1. add an informational page to your support site explaining how you’re using passkeys for more than authentication
      2. list that page URL in the Well-Known URL for Relying Party Passkey Endpoints (prfUsageDetails)
      3. provide as much warning as possible up front to users when enabling it

    Thanks for reading! 🙏🏻

    (and thanks to Matthew Miller for reviewing and providing feedback on this post)

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleUltrahuman Ring Pro Brings Better Battery Life, More Action and Analysis
    Next Article OpenAI reaches deal to deploy AI models on U.S. DoW classified network
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Middle East conflict casts shadow of global ad outlook

    March 13, 2026

    Customer reviews become a key battleground as AI revolutionizes product discovery

    March 13, 2026

    In graphic detail: Middle-tier creators are fueling the next phase of the creator economy

    March 13, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025716 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025302 Views

    Wired Headphones Are Making A Comeback, And We Have Gen Z To Thank

    July 22, 2025210 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025172 Views
    Don't Miss
    Technology March 13, 2026

    Middle East conflict casts shadow of global ad outlook

    Middle East conflict casts shadow of global ad outlook By Seb Joseph  •  March 13,…

    Customer reviews become a key battleground as AI revolutionizes product discovery

    In graphic detail: Middle-tier creators are fueling the next phase of the creator economy

    The Future of Marketing Briefing: a war, an oil spike and an ad market that can’t see what comes next

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Middle East conflict casts shadow of global ad outlook

    March 13, 20263 Views

    Customer reviews become a key battleground as AI revolutionizes product discovery

    March 13, 20263 Views

    In graphic detail: Middle-tier creators are fueling the next phase of the creator economy

    March 13, 20262 Views
    Most Popular

    Outbreak turns 30

    March 14, 20250 Views

    New SuperBlack ransomware exploits Fortinet auth bypass flaws

    March 14, 20250 Views

    CDs Offer Guaranteed Returns in an Uncertain Market. Today’s CD Rates, March 14, 2025

    March 14, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.