/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
TEXXR

Chronicles

The story behind the story

days · browse · Enter similar · o open

The technology of passkeys is elegant, but the complexities of syncing them to password managers can contribute to platform lock-in and make them less usable

https://arstechnica.com/... @funnymonkey@freeradical.zone : This piece on Passkeys is stellar, and shows what happens when Big Tech does its best to extinguish a good idea through “enthusiastic” adoption.  —  https://arstechnica.com/... Forums: Hacker News : Passkey technology is elegant, but it's most definitely not usable security r/privacy : Passkey technology is elegant, but it's most definitely not usable security r/PasswordManagers : Passkey technology is elegant, but it's most definitely not usable security r/technews : Passkey technology is elegant, but it's most definitely not usable security |  Just in time for holiday tech-support sessions, here's what to know about passkeys. r/technology : Passkey technology is elegant, but it's most definitely not usable security |  Just in time for holiday tech-support sessions, here's what to know about passkeys. lobste.rs : Passkey technology is elegant, but it's most definitely not usable security Ars OpenForum : Passkey technology is elegant, but it's most definitely not usable security

Ars Technica