Sunday, October 26, 2025
No Result
View All Result
DOLLAR BITCOIN
Shop
  • Home
  • Blockchain
  • Bitcoin
  • Cryptocurrency
  • Altcoin
  • Ethereum
  • DeFi
  • Legal Hub
  • More
    • Market & Analysis
    • Dogecoin
    • NFTs
    • XRP
    • Regulations
  • Shop
    • Bitcoin Book
    • Bitcoin Coin
    • Bitcoin Hat
    • Bitcoin Merch
    • Bitcoin Miner
    • Bitcoin Miner Machine
    • Bitcoin Shirt
    • Bitcoin Standard
    • Bitcoin Wallet
DOLLAR BITCOIN
No Result
View All Result
Home Blockchain

Dashlane debuts passwordless access to its password manager – but beware this major hitch

by n70products
October 18, 2025
in Blockchain
0
Dashlane debuts passwordless access to its password manager – but beware this major hitch
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter


dashlane5555gettyimages-1443142557

Yuichiro Chino/Second through Getty Pictures

Observe ZDNET: Add us as a preferred source on Google.


ZDNET’s key takeaways

  • Dashlane now permits you to login to its password supervisor with a passwordless passkey.
  • The function is predicated on a draft commonplace from the World Extensive Net Consortium.
  • It isn’t anticipated to work on the cell model of Dashlane till early subsequent yr.

The overwhelming majority of cybersecurity transgressions — a lot of which result in the exfiltration of confidential info or monetary losses — begin with a password phishing rip-off. 

Analysis shows that 98% of end-users proceed to fall prey to phishers regardless of cybersecurity coaching. The one reply to the phishing scourge is an industry-wide effort to eliminate passwords (embellished with second-factor codes or not) as the first technique of authenticating with web sites, apps, and different on-line companies (collectively known as “relying events”). 

Additionally: How passkeys work: The complete guide to your inevitable passwordless future

And that is what the FIDO Alliance’s passwordless passkey standard is all about: providing a brand new, safe approach to login that does not require you to furnish a secret like a password as part of a typical authentication workflow. (See ZDNET’s series on how passkeys work.) The logic goes this manner: If there is not any password to share with a professional relying celebration, then there is not any password to by accident share with phishers and different social engineers. 

Downside solved. Proper? Nicely, form of. 

The final mile of credential administration  

With a view to use passkeys, you will additionally want an interlocutor — equivalent to a password supervisor — to deal with their creation, safe storage, and presentation (at time of login). Traditionally, this has offered an intractable chicken-and-egg paradox in the case of logging into the password supervisor itself. If it is advisable be logged in to your password supervisor so as to login to the whole lot else with out a password, then how is a passwordless login to your password supervisor doable with out the assistance of that password supervisor? In spite of everything, you are not logged into it. And, if there’s one password you by no means need to get phished for, it is the password to your password supervisor — the proverbial key to the dominion.

Though this final susceptible mile of credential administration is technically addressed by a proposed extension (WebAuthn PRF) to a World Extensive Net Consortium commonplace (WebAuthn: one of many key constructing blocks to the passkey commonplace), the draft commonplace has but to be broadly embraced with wholly passwordless implementations by third-party cross-platform password managers. 

BitWarden is without doubt one of the early supporters of the standard in its password supervisor (here’s a video exhibiting it in motion) and the password supervisor in Google Chrome approximates the idea when customers activate Google’s Advanced Protection Program). 

Now, Dashlane has partnered with Yubico to affix the checklist of WebAuthn PRF-compliant password managers to get rid of the necessity for a grasp password when logging into its namesake password administration software.

Feels like voodoo. How does it work?

In the case of third-party password administration options (formally referred to by the WebAuthn and passkey requirements as virtual authenticators), the person’s password to their password supervisor truly serves a twin function. As is commonly the case with many different relying events (particularly ones that do not but assist passkeys), the password serves as the idea for logging into the person’s password administration account. 

Moreover, within the case of most password managers, the person’s grasp password is a secret bit of fabric that additionally performs a task within the algorithms used to uniquely encrypt and decrypt the person’s password administration vault. (It is a particular software program container that securely shops the person’s varied web site and app credentials  — and generally different delicate secrets and techniques like bank card numbers.) Wherever that vault resides — on any of your units or within the password supervisor’s cloud– it resides there in encrypted kind. The one approach to decrypt it, significantly when your system first begins to run your password supervisor as a form of background job, is with the grasp password to your password supervisor. That is one cause that your vault is secure from hackers when your password supervisor syncs your vault to its cloud for the aim of syncing it to your different units. Wherever it resides in encrypted kind, it is ineffective to hackers.

Additionally: The best password managers: Expert tested

As such, dropping your password in favor of a passwordless passkey as the idea for authenticating along with your password supervisor truly presents two technical conundrums:

  1. There should be a approach to recall the passkey to the password supervisor with out the interlocution of the password supervisor itself.
  2. One other distinctive and unphishable secret should be substituted to your password because the confidential ingredient for vault encryption and decryption. 

Enter Yubico’s Yubikey. A number of fashions of this fashionable safety key can hook up with your units through USB or, within the case of some fashions, through the wi-fi near-field communication (NFC) commonplace (the identical {industry} wi-fi proximity commonplace that lets you faucet a point-of-sale bank card terminal along with your bank card or smartphone). 

screenshot-2025-05-19-at-2-42-20-pm.png

Yubico’s YubiKey 5C NFC is enabled for USB-C and wi-fi NFC connectivity to desktops, laptops, and cell units.

Yubico

The WebAuthn PRF specification prescribes an {industry} commonplace technique by which a bodily FIDO2-compliant safety key (formally described as a roaming authenticator by the WebAuthn commonplace) can take over each roles; first as a separate and safe container for the passkey that you will use to login to your password supervisor (thereby fixing for the primary rooster and egg paradox) and second as a supply of the distinctive and secret materials from which that passkey and the keys for encrypting and decrypting your vault are derived. 

Additionally: The best security keys: Expert tested

Just like the Safe Enclaves discovered on all Apple units and the Trusted Platform Modules (TPMs) present in {hardware} that run Home windows, Linux, and Android, each YubiKey is uniquely encoded with secret info that units it aside from different YubiKeys (in addition to from different FiDO2-compliant roaming authenticators like Google’s Titans). In different phrases, no two roaming authenticators are precisely the identical. 

When you get rid of the password to your password supervisor, and given how your passkey to your password supervisor, in addition to the keys for encrypting and decrypting your vault, are derived from that secret bit of fabric, you can not login to your password supervisor or decrypt your vault with out first connecting that very same bodily roaming authenticator to your system. Because of this, as soon as you choose to make use of a roaming authenticator to login to your password supervisor, menace actors can not phish or in any other case socially engineer you for the credentials to your password supervisor. No person — neither they nor you — can login with out being in bodily possession of your roaming authenticator. 

However there is a hitch or two

Whereas WebAuth PRF-compliant password managers are lastly fixing for that final susceptible mile, there are two gotchas, one in every of which nearly eliminates the prospect that you will be making the swap in the present day. 

The primary and most blatant of those gotchas has to do with the likelihood that you can lose your roaming authenticator. If all you’ve is one roaming authenticator and also you lose it, you will additionally lose entry to any wholly passwordless accounts– together with that of your password supervisor — whose passkeys had been saved on that system. 

Additionally: I’m ditching passwords for passkeys for one reason – and it’s not what you think

Happily, the way in which the WebAuth PRF commonplace works, it is doable to make use of the primary roaming authenticator to initialize a number of backup roaming authenticators so as to defend your self from the lack of any of them. That is why having backup roaming authenticators is not simply beneficial. It is crucial. With out such a backup, there isn’t a automated restoration routine just like the one which exists in the event you lose or overlook the password to your password supervisor. 

“You have to arrange an additional key,” Dashlane director of product innovation Rew Islam advised ZDNET. “You [stow] that key wherever you need and even go along with a number of [roaming authenticators].” Based on Islam, if Dashlane had been to supply a restoration workflow that concerned a secret phrase or electronic mail, it could fully undo the phishing-proof nature of the WebAuthn-compliant method utilizing a YubiKey.

Additionally: Your passkeys could be vulnerable to attack, and everyone – including you – must act

“If we assured 100% availability of your account, then there’s actually no safety,” stated Islam. Implying that the majority such automated restoration mechanisms are susceptible to social engineering, Islam stated, “I can achieve entry to your account.”

Nonetheless, managing backup roaming authenticators is less complicated stated than carried out. For instance, for instance you are happening a visit and you’ll’t lose entry to your password supervisor when you’re away. What number of roaming authenticators do you have to carry, and what’s your technique for storing them in order that the lack of one would not additionally contain the lack of the others? These are issues that you do not want to consider with a recoverable, albeit phishable, password.

If that is not sufficient to provide you trigger for pause, the opposite gotcha will probably be. 

The gaps: iOS and Android assist

The thought behind a roaming authenticator is that, as soon as you have set it up, you may “roam” it to any of your units. For instance, the identical roaming authenticator ought to allow you to login to your password supervisor out of your smartphone in addition to your pocket book pc. In spite of everything, you will want it for logging into your entire totally different accounts from each units. Sadly, in the present day, in the case of WebAuth PRF compliance, there are gaps in how the draft commonplace is supported on iOS and Android. 

“When there are these requirements, we now have to attend for the platforms to resolve what to do with them. Passkeys are a hit as a result of Microsoft, Google, and Apple signed as much as implement them; implementing these items into their methods, their working methods, their browsers,” stated Islam. “However that does not imply they must implement each single piece of the specification. So, what has occurred? On [iOS] and Android, a number of the plumbing for [roaming authenticator] assist is simply lacking.”

Additionally: This new cyberattack tricks you into hacking yourself. Here’s how to spot it

Islam expects that, with the assistance of some new Software program Growth Kits (SDKs) coming from Yubico, the gaps will probably be crammed by early subsequent yr. However in the interim, in the event you want entry to Dashlane in your cell system, now is just not a superb time to transform to a completely passwordless configuration of the password supervisor. The method, a minimum of because it pertains to Dashlane, is irreversible. 

“We all know that that is making a scenario that is not actually comfy,” stated Islam, who instructed that the newborn step was nonetheless essential so as to transfer industry-wide adoption of the WebAuthn PRF commonplace ahead. “We want that discomfort to push sure issues [in the industry forward]. So it was a strategic resolution. Now, it’s only a ready recreation.”

Keep forward of safety information with Tech Today, delivered to your inbox each morning.





Source link

Tags: accessbewareDashlaneDebutshitchMajorManagerpasswordpasswordless
Previous Post

Regional Banks Face Renewed Stress As Bitcoin Drops To $104K

Next Post

Dogecoin Faces ‘Do-Or-Die’ Moment Ahead Of Oct. 23: Analyst

Next Post
Dogecoin Faces ‘Do-Or-Die’ Moment Ahead Of Oct. 23: Analyst

Dogecoin Faces 'Do-Or-Die' Moment Ahead Of Oct. 23: Analyst

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Premium Content

Peirce signals SEC ‘reorientation’ under new chair Paul Atkins

Peirce signals SEC ‘reorientation’ under new chair Paul Atkins

April 22, 2025

Bitcoin Price Hits $63,000, Is The Market Set For Takeoff?

October 12, 2024
BNB Is the ‘Most Overlooked Blue-Chip,’ Says CEA CEO

BNB Is the ‘Most Overlooked Blue-Chip,’ Says CEA CEO

October 12, 2025

ADA Charts Turn Bearish – Technical Indicators Signal More Pain Ahead

February 24, 2025

DOT Price (Polkadot) Jumps 10%, Why Bulls Can Pump It To $12

March 7, 2024
4 better ways to protect your business than dreaded (and useless) anti-phishing training

4 better ways to protect your business than dreaded (and useless) anti-phishing training

September 30, 2025

Recent Posts

  • Binance’s CZ Clashes with Warren After Trump Pardon Comments
  • Black Friday 2025: Here’s how to save like a shopping editor this holiday season
  • A week with this Samsung smart monitor convinced me I might be done with TVs

Categories

  • Altcoin
  • Bitcoin
  • Blockchain
  • Blog
  • Cryptocurrency
  • DeFi
  • Dogecoin
  • Ethereum
  • Market & Analysis
  • NFTs
  • Regulations
  • XRP

Recommended

Binance’s CZ Clashes with Warren After Trump Pardon Comments

Binance’s CZ Clashes with Warren After Trump Pardon Comments

October 26, 2025
Black Friday 2025: Here’s how to save like a shopping editor this holiday season

Black Friday 2025: Here’s how to save like a shopping editor this holiday season

October 26, 2025

© 2025 Dollar-Bitcoin | All Rights Reserved

No Result
View All Result
  • Home
  • Blockchain
  • Bitcoin
  • Cryptocurrency
  • Altcoin
  • Ethereum
  • DeFi
  • Legal Hub
  • More
    • Market & Analysis
    • Dogecoin
    • NFTs
    • XRP
    • Regulations
  • Shop
    • Bitcoin Book
    • Bitcoin Coin
    • Bitcoin Hat
    • Bitcoin Merch
    • Bitcoin Miner
    • Bitcoin Miner Machine
    • Bitcoin Shirt
    • Bitcoin Standard
    • Bitcoin Wallet

© 2025 Dollar-Bitcoin | All Rights Reserved

Feature

U.S. Regulated
 

Close the CTA

Beginner Friendly
 

Advanced Tools
 

Free Bitcoin Offer
 

Mobile App
 

10$

5$

Varies
 

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
💵 Turn Every Dollar Into Crypto Rewards! Wirex lets you spend dollars or bitcoin — and get up to 8% back in crypto instantly. 💸 Exclusive offers dropping soon — stay tuned!
“Offers Launching Soon”
This is default text for notification bar
Learn more
Go to mobile version