Except they don’t. They may request a passkey which is just an oversimplification about what is going on behind the scenes, with information being passed back and forth as Steve described.
But the private key never leaves the device. This is such a huge distinction that is easy to overlook. But it is very, very important.
Haha fair enough. I should have known from the quotes. It is something I hear a lot from people who don’t know the difference, and I’m sure you do too.
Except they don’t. They may request a passkey which is just an oversimplification about what is going on behind the scenes, with information being passed back and forth as Steve described.
But the private key never leaves the device. This is such a huge distinction that is easy to overlook. But it is very, very important.
I guess my sarcasm needed the /s; was just mocking people who would try to retort with some half brained comment like that.
Of course passkeys are better and more secure, I’m 100% on board with them.
Haha fair enough. I should have known from the quotes. It is something I hear a lot from people who don’t know the difference, and I’m sure you do too.