Qubes OS browser extension for passwords and passkeys #9695
Labels
C: other
P: default
Priority: default. Default priority for new issues, to be replaced given sufficient information.
security
This issue pertains to the security of Qubes OS.
T: enhancement
Type: enhancement. A new feature that does not yet exist or improvement of existing functionality.
ux
User experience
How to file a helpful issue
The problem you're addressing (if any)
Password management in Qubes OS is non-trivial and not (inherently) phishing-resistant. Browsers on Qubes OS do not support passkeys.
The solution you'd like
Qubes OS should provide a browser extension that implements password and passkey management. The browser extension would use Native Messaging to communicate with a daemon (written in Python or Rust) that in turn communicates with the vault VM over qrexec. Passkeys can be stored in software (default) or a hardware token (needed for attestation).
The value to a user, and who that user might be
All users willl benefit from better password management and from native passkey support.
Completion criteria checklist
(This section is for developer use only. Please do not modify it.)
The text was updated successfully, but these errors were encountered: