this post was submitted on 16 Sep 2025
453 points (98.5% liked)

Programmer Humor

26351 readers
1023 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 2 years ago
MODERATORS
 
top 30 comments
sorted by: hot top controversial new old
[–] 01189998819991197253@infosec.pub 1 points 31 minutes ago

What happens to the account access if the passkey-registered device dies?

[–] RustyNova@lemmy.world 91 points 12 hours ago (4 children)

I kinda hate the push towards passkeys. If you have two factor Auth, going to passkeys makes you go back to 1 factor, aka less secured.

There's also more and more 2FA fatigue attacks going on, and they can affect passkeys too, and if you don't have a 2FA that involves the user writing a code on the 2FA device, passkeys could be quite possibly worse than passwords

[–] malwieder@feddit.org 21 points 9 hours ago

Passkeys use public key authentication. This makes them very resistent to phishing attacks. It's also not possible for a phishing site to request authentication via a passkey created on a the original website.

[–] ramjambamalam@lemmy.ca 47 points 11 hours ago (1 children)

I think this post is about git CLI, not www.github.com.

SSH keys are very secure and you can still encrypt them with a password if you wish.

[–] jonjuan@programming.dev 24 points 10 hours ago (3 children)

encrypt them with a password if you wish.

SSH keys without passphrases are just fancy credential files sitting in your .ssh/ directory, basically like writing your passwords on paper and leaving it in your desk drawer.

[–] tauonite@lemmy.world 1 points 4 hours ago

TIL some people store SSH keys unencrypted

[–] Sasquatch@lemmy.ml 10 points 10 hours ago (2 children)

Yeah, but who wants to type in a password everytime they push/pull?

[–] LedgeDrop@lemmy.zip 15 points 9 hours ago

Take a look at ssh-agent. It's bundled with ssh-client and designed to solve this problem.

The quick usage is, create a terminal and run:

eval `ssh-agent`
ssh-add /path/to/your/encrypted/key1
#type in password
ssh-add /path/to/your/encrypted/key2
... 

# all commands in this terminal will use the keys above w/o asking you for a password 
git clone git@githib.com...
git push... 
etc

So, basically you type your credentials once during the life cycle of your terminal.

If you really want to go full power-user, simple run ssh-agent (without the eval) and you'll see it just sets some env-vars, which can be imported into any terminal/shell you have open.

So, if you put some logic in your shells rc file, you can effectively share a single ash-agent between all your shells, meaning you just need to type your password for your keys once when you log into your system... and your now passwordless for any future terminals you create (this is my setup).

Also, if you're interested take a peek at the man pages for ash-agent. It has a few interesting features (ie: adding a password lock for your agent, removing keys from the agent, etc).

[–] ulterno@programming.dev -2 points 8 hours ago

I do it.
Every time.

And I keep a wired keyboard for it.

[–] ThunderQueen@lemmy.world 4 points 9 hours ago

I had mine on paper for years before i learned about Keepass. I trusted it more than a cloud based manager because someone would have to physically be in my room.

I am a lot more careful these days but that is not beyond the pale for a lot of folks haha

[–] nialv7@lemmy.world 12 points 10 hours ago (1 children)

It's different. It's still two factors if implemented correctly: 1. Possession of the passkey (better if you have a physical token, but passkey on your phone is passable). 2. Knowledge of your password (or bio authentication if you use face id or w/e).

Note you are not giving your password to the website, and if a hacker gets hold of your password they still can't do anything without your passkey device.

[–] RustyNova@lemmy.world 6 points 10 hours ago (1 children)

Knowledge of your passwords

Uh... What password?

[–] nialv7@lemmy.world 15 points 10 hours ago (1 children)

Passkey should ask for a password for unlocking. If it doesn't then it's not implemented correctly.

[–] jj4211@lemmy.world 6 points 10 hours ago (1 children)

It's client specific and my phone requires whatever can unlock the phone and chrome requires either windows hello or a pin if under linux.

Certain implementations do whatever, and as far as the backend is concerned, there's no way of knowing, unless you want to get into the business of locking down specific vendor keys...

But I say MFA is overrated versus just getting away from generally crappy password factors. Also passkeys are less phish-able than OTP type solutions.

[–] nialv7@lemmy.world 2 points 7 hours ago* (last edited 7 hours ago)

Yes, it's implementation specific, in this case your phone, or your browser is the passkey "device". And as long as it's protected by some form of authentication it's OK (though I would recommend a hardware token over phones/browsers). If it doesn't then you shouldn't be using that "passkey". Yes, there is no way for the website you are authenticating with to know whether your passkey is safe or not, choosing a secure passkey implementation is (unfortunately) the user's job. But it's the same with more traditional 2FAs, e.g. you can store your TOTP secret securely or insecurely, and the website will have no way to know.

[–] YtA4QCam2A9j7EfTgHrH@infosec.pub 20 points 12 hours ago (2 children)

Yeah. Passkeys are something I would love if they were a second factor because they are so much better than any other 2fa. And I use my yubikeys as second factors where I can. But why the hell would I not want a password too?

[–] nialv7@lemmy.world 12 points 10 hours ago

Passkeys are always supposed to be protected by another layer of authentication. e.g. a password should be required to unlock the passkey. If your passkey don't do that, stop using it.

[–] jj4211@lemmy.world 6 points 10 hours ago

If I provide passkey support and still require a password, most users will get annoyed and not bother. If I provide it as a replacement for password, then I can get them onboard more often. I'd rather have them using passkey than sticking with password.

[–] BootLoop@sh.itjust.works 24 points 12 hours ago* (last edited 12 hours ago) (1 children)

If this isn't referring to the Git CLI that prompts the user for username and password for a GitHub remote repository and GitHub rejecting password auth, then disregard this rant.

Git and GitHub are two seperate pieces of software. Git is the local client that does all the work and can optionally sync with a remote repository that can be stored in GitHub or GitLab or any other compatible remote. When Git asks for a password to authenticate, it has nothing to do with GitHub. GitHub then rejects that authentication method that Git provided because it believes that the method is insecure.

[–] fuzzzerd@programming.dev 6 points 9 hours ago

Wait until we tell them that Java and JavaScript are also different languages that are completely different things.

[–] Korne127@lemmy.world 18 points 13 hours ago (1 children)

I mean, that’s just the Git behavior.

[–] Quill7513@slrpnk.net 11 points 12 hours ago

not sure why you're getting downvoted for actually knowing the default behavior for git when interacting with an http remote

[–] 30p87@feddit.org 17 points 13 hours ago (1 children)
[–] Quill7513@slrpnk.net 32 points 12 hours ago (1 children)

GitHub hasn't allowed http pushes with password auth for a while. you need either to do an ssh push or use an api token. yet, anythime you do an http push for the first time, you are prompted for a password. the real reason for this is git, not github

[–] bananabread@lemmy.zip 2 points 11 hours ago (1 children)
[–] Quill7513@slrpnk.net 7 points 11 hours ago (1 children)

doesn't really matter, but https. it's the only endpoint github has available and all http requests get redirected. the reason i say it doesn't matter is that git will prompt you for your password before even trying to communicate with the remote

[–] bananabread@lemmy.zip 2 points 9 hours ago
[–] ohellidk@sh.itjust.works 8 points 12 hours ago* (last edited 12 hours ago) (1 children)

Still using Github, the American company owned by Micro$oft, known for deleting repos? I'd consider switching away from them, If you're able to.

[–] ExLisper@lemmy.curiana.net 5 points 11 hours ago

They offer free build time on windows and mac. There are also specific integration for GitHub not available for other platforms. I don't rely on it for storing my code, just for building. I could spend a month and migrate to a different platform but so far there was no point.

[–] cupcakezealot@piefed.blahaj.zone 1 points 12 hours ago

when they tell you to check your email for a code when you just put in your username and password