As I understand it, instead of the website or online service storing your password (in a, supposedly secured way), with passkey your password manager stores a private key and the online service stores a public key (or rather a lock). The key and the lock are paired together cryptographically (mathematical functions that are non-reversible). Now when you login with passkey, the service sends a challenge generated from the lock, that can be solved only with the matching private key, your password manager solves the challenge and your authenticated. Locks and keys were not exchanged during the process, and services never store your key. Everything happens automagically.
It actually uses the same protocol used is some hardware security keys such as Yubikey and Solokeys. The problem remains the same as with hardware security keys, adoption and support, compatibility. It's very rare that a service supports these options, although they exist for a while.
Anyone feels free to correct me if I wrote something wrong. I am by no mean an expert.
The (over?) simplified version is they’re basically the same as the key/certificate pairs you use to connect to a website securely while also proving its identity to you.
Some key benefits of passkeys are:
Your private key doesn’t leave your device (or your password manager). You no longer have to worry about if the website you’re using is incompetent and storing your password in plain text waiting to be stolen in a breach. The only one who can expose your passkey is you (or your password manager)
Your passkey isn’t something you have to remember so for the unwashed masses it’s more idiot proof because they’re more secure by default
The passkey user experience needs work. It's mostly on the client side, I think the implementation is good but it's just way too easy to lose a passkey forever.
I couldn't possibly remember all my passphrases unless I reused them everywhere, which would leave me with an arbitrary number of centralized vulnerabilities, under the responsibility of people who don't give a shit.
I don't know how many accounts an average internet user has, but I'm pretty sure it's well above the human's memory capabilities. Assuming this is true, there are 4 scenarios:
You use the same password everywhere, so any service leaking it means it's leaked for every other one.
You use different passwords every time, so you have to have a centralized vulnerability where you store them all.
You memorize some, and the rest do the same as 2.
Like 1. Except you memorize more than 1 password.
Is the least secure but the easiest.
Has the centralized vulnerability problem.
Assuming that in 3. You don't store the most critical passwords (email, banking, etc.) it's the most secure. But requires a lot of care and memory. And also has the highest penalty if you forget a password.
Is just 3. But worse (but don't need to check the password storage).
So instead of comparing 2. To 5. (5. Being a magical scenario where you can remember all your passwords that are different from each other). We should compare 2. to 3. (Or 4. Instead of 3. If you really don't want a password storage).
Is massively more convenient than 3.
The only advantage of 3. In convenience is that you don't need to have a password storage for some passwords. Which I don't think it's comparable to having to remember passwords.
The only security benefit of 3. Over 2. Is that your critical accounts are safe if that password storage is breached.
How likely is it to be breached though? If you are serious about security you should be using an actual password manager, which is focused on security. The only way to get passwords out of it should be to put in the master password, which should be impossible if the master password is good enough (which you can afford since you only need to remember one password). Additionally, you can use multiple factors, which might not be available on normal websites.
The only moment really where a password can be intercepted is while it is in your clipboard. Which is why TikTok reading the user's clipboard without consent should be taken way more seriously than it had been.
Of course every method fails with the wrench to the head technique (insert xkcd here).
It ends up being a lot like FIDO or Passkeys but without having to store a separate key for each site. Each key is derived from your master key and the domain so they are all unique, to prevent tracking, but you still don't have to save a separate private key blob for each site. There is also a recovery key built into the spec so that if your master key somehow gets out, you can use your recovery key to prove you're the real person and regain your account to change the signin public key.
We haven’t reached the level of passwords yet because of their restrictive policies leading to users storing copies of their passwords near the computer.
We basically just have usernames with slightly more steps.