Can any #ITSecurity folks point me to some useful resources on how #passkey actually works?
There are plenty of guides on how to use it, usually with a focus on one particular platform, but I can find very little implications on how it works or the implications of using it, other than broad, unqualified promises that it's safer and better.
=> More informations about this toot | View the thread | More toots from growlph@greywolf.social
=> View itsecurity tag | View Passkey tag This content has been proxied by September (ba2dc).Proxy Information
text/gemini