• 0 Posts
  • 12 Comments
Joined 2 years ago
cake
Cake day: June 12th, 2023

help-circle



  • There is indeed a big difference between requiring a specific password vs. requiring a specific device or software to be able to use the service. Keep in mind that big tech can very conveniently leverage this technology to lock you in. For example think about Apple, Google and Microsoft requiring you to use passkeys, and then later require you to use your certified phone and app. Most people will not be able to “go elsewhere”.


  • You seem to be falling for what the author was writing about. Only because you could technically try to use keepassxc to store passkeys, that does not mean that it will work. You see passkeys were build in a way the service you’re trying to login to can decide if they accept your keepassxc for passkey storage or not. It looks like you are in control when you are actually not.





  • Good point. The author argues that:

    they buy the device on your behalf so your real name never gets attached to it.

    However it is relatively easy to attribute a sim card to person simply based on its usage. You also leave the same movement patterns on the mobile network. I don’t see a benefit here compared to just using a sim card from a service provider that does not sell their customer data.