¿ªÔÆÌåÓýOn Aug 14, 2022, at 1:53 PM, Bill Rising via <brising@...> wrote:
Maybe I¡¯m just lucky, but all such accounts I have let me give at least two phone numbers when the account is set up. When I¡¯m logging into such accounts they give a choice of options. Both my wife¡¯s and my phone number are listed. I just choose the one I want to use.
The password-less login schemes of which I¡¯m familiar do it by storing cryptographic key pairs somewhere on the user¡¯s device. For example, with ssh logins to Unix-type accounts, the file ~/.ssh/id_rsa contains the secret key, while ~/.ssh/id_rsa.pub contains the public key. A third file, ~/.ssh/known_hosts, contains the public keys of machines on which you have accounts. If you copy these files to another machine, you¡¯ll get password-less logins from that machine. The FIDO scheme to nuke passwords that??are backing actually works pretty much the same way, except they have different ways to store the passkeys. Apple will put them in the Keychain, so they¡¯ll be magically available on all the Apple toys. I was worried about whether the credentials could be transferred between, say, MacOS and Windows. In late April, the FIDO people??telling programmers how to do this. I read that during WWDC there was apparently a session telling developers how to use Keychain Access to move FIDO credentials between different keychains and even other operating systems. I expect there will be teething pains as people learn to use the new scheme. L^2 ?Alice laughed 'There's no use trying,' she said; 'one can't believe impossible things.' 'I daresay you haven't had much practice,' said the Queen. 'When I was younger, I always did it for half an hour a day. Why, sometimes I've believed as many as six impossible things before breakfast.'¡ª?Lewis Carroll,?Alice Through the Looking Glass
?? |