Martin<span class="h-card"><a href="https://mstdn.social/users/rysiek" class="u-url mention" rel="nofollow noopener" target="_blank">@rysiek@mstdn.social</a></span><br>I have long random passwords generated by <a href="https://social.mdosch.de?t=pass" class="mention hashtag" rel="nofollow noopener" target="_blank">#pass</a>. Those are <a href="https://social.mdosch.de?t=pgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#pgp</a> encrypted and synced via <a href="https://social.mdosch.de?t=ssh" class="mention hashtag" rel="nofollow noopener" target="_blank">#ssh</a> and version controlled by <a href="https://social.mdosch.de?t=git" class="mention hashtag" rel="nofollow noopener" target="_blank">#git</a>.<br>I never switched to passkeys.<br>For <a href="https://social.mdosch.de?t=xmpp" class="mention hashtag" rel="nofollow noopener" target="_blank">#xmpp</a> I use <a href="https://social.mdosch.de?t=fast" class="mention hashtag" rel="nofollow noopener" target="_blank">#fast</a> which is sort of the same as passkey.<br><span class="h-card"><a href="https://relay.infosec.exchange/actor" class="u-url mention" rel="nofollow noopener" target="_blank">@relay@relay.infosec.exchange</a></span><br>