+0.55 Please, please, please stop using passkeys for encrypting user data (blog.timcappalli.me S:+0.35 )
277 points by zdw 2 days ago | 233 comments on HN | Moderate positive Contested Editorial · v3.7 · 2026-02-28 11:59:57 0
Summary Digital Privacy & Data Protection Advocates
Tim Cappalli advocates against using passkeys with PRF extensions to encrypt user data, warning that the practice creates a 'blast radius' where users unknowingly risk permanent loss of encrypted backups, photos, and documents. The content champions user privacy rights, informed consent, and data protection while calling for concrete industry safeguards including warnings, documentation, and transparency measures.
Article Heatmap
Preamble: +0.54 — Preamble P Article 1: +0.50 — Freedom, Equality, Brotherhood 1 Article 2: ND — Non-Discrimination Article 2: No Data — Non-Discrimination 2 Article 3: +0.60 — Life, Liberty, Security 3 Article 4: ND — No Slavery Article 4: No Data — No Slavery 4 Article 5: ND — No Torture Article 5: No Data — No Torture 5 Article 6: ND — Legal Personhood Article 6: No Data — Legal Personhood 6 Article 7: ND — Equality Before Law Article 7: No Data — Equality Before Law 7 Article 8: +0.60 — Right to Remedy 8 Article 9: ND — No Arbitrary Detention Article 9: No Data — No Arbitrary Detention 9 Article 10: ND — Fair Hearing Article 10: No Data — Fair Hearing 10 Article 11: ND — Presumption of Innocence Article 11: No Data — Presumption of Innocence 11 Article 12: +0.60 — Privacy 12 Article 13: ND — Freedom of Movement Article 13: No Data — Freedom of Movement 13 Article 14: ND — Asylum Article 14: No Data — Asylum 14 Article 15: ND — Nationality Article 15: No Data — Nationality 15 Article 16: +0.20 — Marriage & Family 16 Article 17: +0.60 — Property 17 Article 18: ND — Freedom of Thought Article 18: No Data — Freedom of Thought 18 Article 19: +0.62 — Freedom of Expression 19 Article 20: ND — Assembly & Association Article 20: No Data — Assembly & Association 20 Article 21: +0.30 — Political Participation 21 Article 22: ND — Social Security Article 22: No Data — Social Security 22 Article 23: ND — Work & Equal Pay Article 23: No Data — Work & Equal Pay 23 Article 24: ND — Rest & Leisure Article 24: No Data — Rest & Leisure 24 Article 25: +0.30 — Standard of Living 25 Article 26: ND — Education Article 26: No Data — Education 26 Article 27: +0.50 — Cultural Participation 27 Article 28: ND — Social & International Order Article 28: No Data — Social & International Order 28 Article 29: ND — Duties to Community Article 29: No Data — Duties to Community 29 Article 30: ND — No Destruction of Rights Article 30: No Data — No Destruction of Rights 30
Negative Neutral Positive No Data
Aggregates
Editorial Mean +0.55 Structural Mean +0.35
Weighted Mean +0.53 Unweighted Mean +0.49
Max +0.62 Article 19 Min +0.20 Article 16
Signal 11 No Data 20
Volatility 0.14 (Medium)
Negative 0 Channels E: 0.6 S: 0.4
SETL +0.54 Editorial-dominant
FW Ratio 57% 20 facts · 15 inferences
Evidence 21% coverage
3H 5M 3L 20 ND
Theme Radar
Foundation Security Legal Privacy & Movement Personal Expression Economic & Social Cultural Order & Duties Foundation: 0.52 (2 articles) Security: 0.60 (1 articles) Legal: 0.60 (1 articles) Privacy & Movement: 0.60 (1 articles) Personal: 0.40 (2 articles) Expression: 0.46 (2 articles) Economic & Social: 0.30 (1 articles) Cultural: 0.50 (1 articles) Order & Duties: 0.00 (0 articles)
HN Discussion 19 top-level · 29 replies
halapro 2026-02-28 03:51 UTC link
If the user deletes passwords they're shown the same exact message. The only saving grace for passwords is that you can remember them, but are you also suggesting to not use generated passwords?
SoftTalker 2026-02-28 03:52 UTC link
This is why I haven't started using passkeys. Managing them is looks complicated and I don't understand the ramifcations of what I'm doing.

Also a style nit, it's OK to use "he" or "she" pronouns in a contrived narrative. The "they/their" usage really detracted from the clarity of the example.

dchest 2026-02-28 03:58 UTC link
Nothing in this post is specific to passkeys; it reads like advice to not encrypt data. There’s no way to prevent some users from losing their encryption key anyway. Whatever warnings you include, even when software doesn't connect to the internet and just encrypts local files, someone will write to support that they forgot their password and ask you to "reset" it.

Good advice at the end, though.

dansjots 2026-02-28 04:01 UTC link
I recently whipped up a bare-bones PWA wrapping Typage[0] into a quick-and-dirty tool to encrypt files individually using passkeys:

https://news.ycombinator.com/item?id=46895533

This give much more conscious control to the user knowing that they are explicitly encrypting which file with which passkey. Additionally, you can just download the page and serve it via localhost so that you always have control of the relying party for your passkey.

[0] https://words.filippo.io/passkey-encryption/

johncolanduoni 2026-02-28 04:11 UTC link
How many people are doing a spring cleaning of unused passkeys in their password managers? We're talking like a kilobyte of data, nobody needs to delete these things in any kind of normal circumstance.

Sure, it would be great if users would store 5 copies of their encryption keys, with one in a lockbox on the bottom of the ocean. But that's just not going to happen at any kind of scale, so an automatic way of putting encryption keys in a replicated password manager makes sense. And compared to how people normally handle end-to-end encryption keys, it's going to result in a lot less loss data in practice.

arjie 2026-02-28 04:25 UTC link
Passkeys have way too many footguns for me. If I use my phone to sign in I'm going to accidentally create a passkey there on iOS embedded webview. When I use Google Chrome, the website won't give me any information for me to find where I stored the passkey. Was it in iOS keyring? Chrome? My Bitwarden? If I had any discipline around this it would make sense but if I accidentally double tap on the screen I've got a passkey and it's stuck on my phone.

I'm sure it's of use to many people but it's been no end of pain for me and it has really signaled to me what it's like to grow into an old man unable to use computers when I was once a young man who would find this easy.

akersten 2026-02-28 04:54 UTC link
> Don't use passkeys

Better title.

Mom can't figure out what they are or how to use them. They bind you to your device/iCloud/Gaia account so if it gets stolen/banned you're out of luck (yeah yeah multiple devices and paths to auth and backup codes, none of that matters). It's one further step down the attested hardware software and eyeballs path. Passwords forever, shortcomings be damned.

sandeepkd 2026-02-28 06:13 UTC link
Probably everything else is debatable, I do agree with one thing though, the cat is indeed out of the bag. It would have been probably a really good use case if the scope was limited to only hardware based security keys for enterprise users only. Rolling it out for OS platforms, software based authenticators just muddies the water. You cannot even provide any guarantees around it being phishing resistant anymore.
whyagaintango 2026-02-28 07:25 UTC link
It is conundrum that passkeys were designed to help the majority as they are frictionless (like passwordmanagers etc) but fail in reality.

Even those that have 2 devices they don't have them all the time.

Another overlooked issue is that some banks etc don't allow for 2 devices as login or 2FA. Even if it allowed one needs to keep the spare device always updated. Either Govt needs to build a common API that one can use directly through google pay or apple pay - so that only one app is needed to be kept up to date.

to be honest, I wouldn't mind if google/Apple can take all my private data and passkeys hold them - but at least then if I lose the phone - and I show my ID they should allow me to setup my new phone. But that is also not possible. (I am discounting the awful AI bans)

cadamsdotcom 2026-02-28 08:01 UTC link
Passkeys aren’t going to make it unfortunately but that’s ok.

They’ll teach us what we need to know to create something that will do what they’re trying to do.

hbogert 2026-02-28 08:17 UTC link
Still android doesn't support NFC in combination with resident passkeys.
ifh-hn 2026-02-28 08:33 UTC link
Passkeys to me come across as a part solution to a valid problem. Education is part of the solution. Treating the user as too dumb to understand why they need strong passwords or passkeys is important.

I actually despair about when my family members are forced into passkeys and then lose access to their accounts because they get a new device.

I use passkeys from keepasxc because the native workflow for passkeys is opaque and easy to misunderstand what you are actually doing. And it's predicated on having an account with big us tech companies.

seanieb 2026-02-28 09:06 UTC link
> "Even if there were explanatory text, Erika, like most users, doesn’t typically read through every dialog box, and they certainly can’t be expected to remember this technical detail a year from now."

Passkeys are a step in the right direction, ironically for the exact reason the author advises caution. We've been telling people to "store your backup key somewhere safe" for the best part of a decade now, and your average Erika hasn't got on well with that at all. Locking themselves out and losing data left, right and centre.

If you've worked at any kind of scale you'll know well that a certain percentage of users will lose their data with E2EE, full stop. It's just different from everything else they've ever used. These are the same people who'd be lost without the "forgot password" link, and there's no shame in that. That's just the reality of it. And passkeys can help people like this to not lose their keys.

If the product is truly E2EE, the best options right now are the passkey implementations baked into Chrome or Apple. Windows, as ever, needs a bit of work, but the password managers seem to be picking up the slack well enough. We also need to educate people that with true E2EE there is no "forgot password" email. Passkeys and the tooling around them still have a ways to go, but we're getting there.

jgb1984 2026-02-28 09:13 UTC link
The title could've been shorter: don't use passkeys. Period.
Paddyz 2026-02-28 09:15 UTC link
The core issue here is a category error that the industry keeps making: treating authentication credentials and encryption keys as interchangeable. They have fundamentally different lifecycle requirements.

Authentication is recoverable by design - you can always reset, re-verify identity, issue new credentials. Encryption keys are the opposite: lose the key, lose the data. Full stop. No amount of UX polish changes this mathematical reality.

The PRF extension makes this worse because it blurs the line even further. Users interact with passkeys as "login things" - the mental model is authentication. But when PRF derives an encryption key from that same passkey, you've silently upgraded a replaceable credential into an irreplaceable secret. The user's mental model doesn't update.

What we actually need is for the WebAuthn spec to include a signal that tells credential managers "this passkey is load-bearing for encryption, not just auth" so they can surface appropriate warnings before deletion. Right now credential managers treat all passkeys identically.

amadeuspagel 2026-02-28 09:36 UTC link
This story of a user deleting their passkey doesn't seem plausible to me. They don't remember why they have a specific passkey for a messaging app? Surely recognizing the app that stores so many memories is enough not to delete the passkey. And why are they "cleaning up" their passkeys in the first place? Yes I put "cleaning up" in quotes, this metaphor, suggesting that a long list of unused passkeys is dirty in some way is inappropriate.

If an app has a billion users, how many do you expect will delete their passkey for no reason? Is this more important then end-to-end encryption for everyone?

If deleting one's passkey for no reason was a thing, I'd expect a real story about a real user, rather then a made-up scenario.

The essay has a condescending attitude towards the normie computer user who can't possibly be expected to know, but it's precisely the normie computer user who would never get the stupid idea of "cleaning up" their passkeys in the first place -- that's something only a nerd with a neurotic attitude to their computer would do.

lxgr 2026-02-28 10:03 UTC link
So... Don't use the PRF extension for its declared purpose? I really wonder how people keep getting Passkeys wrong!
DavideNL 2026-02-28 11:12 UTC link
Somewhat related, i recently ran into the issue, after i created an account on Confer.to [1] on my Desktop, i couldn't login on my iPad / iOS with Proton Pass and/or Bitwarden.

The error message was: "Error: "Authenticator did not return a PRF result — this passkey probably isn’t PRF-capable."

So i now have an account, but can only use it on my Desktop. (can't change to a password login either, it's Passkeys only...)

[1] end-to-end encrypted AI, developed by Moxie Marlinspike, the founder of Signal: https://confer.to/

daft_pink 2026-02-28 11:18 UTC link
The crazy thing is that for a non synced device bound passkey you are tying that user to the device forever.
bensyverson 2026-02-28 04:01 UTC link
I think the distinction is that a passkey is meant to be used for authentication (logging in), and is usually not the only way you can authenticate. If you delete your password, passkey, or 2FA method, you can still go through a "forgot password" flow.

Encryption is different. If you encrypt data with a generated password and then delete it, you're toast, and passkeys are no different. I think the author is arguing that users may not even realize that the passkey itself is needed to decrypt, possibly because they're so associated with login.

kgwxd 2026-02-28 04:05 UTC link
I don't think I would have even realized why I felt tension reading if you hadn't mentioned this. They/their wasn't confusing at all but, giving the hypothetical user a name was the weird part. I realize now I was expecting some other user to enter the scenario the whole time. Alice and Bob style. When I got to the end, I felt like I missed something. If there's just one, "the user"/"they"/"their" is fine.
weird-eye-issue 2026-02-28 04:42 UTC link
Embedded webviews are the stupidest thing ever. Yesterday I got halfway through a checkout process, had to go back to another app to check something, and then the webview simply disappeared so I didn't bother finishing the checkout. This was on Android

Usually I open it in Chrome but for some reason I didn't realize it was a webview this time

EnPissant 2026-02-28 04:45 UTC link
You can just use bitwarden everywhere if you are ok with it in the cloud.
shepherdjerred 2026-02-28 05:10 UTC link
The issue I think is that passkey managers don’t make it clear that deleting a passkey can cause permanent data loss
Someone1234 2026-02-28 05:18 UTC link
Unfortunately some vendors are now REQUIRING passkeys; specific example:

https://www.healthequity.com

> As of October 2025, passkey login has been fully rolled out and is now required for members with Health Savings Accounts (HSAs) and Reimbursement Accounts (RAs) who use the HealthEquity Mobile app and web experience.

https://help.healthequity.com/en/articles/11690915-passkey-f...

The FAQ is a little misleading by saying WHEN your account has a passkey this and that, but reality is that after October they made them completely mandatory, no bypass, no exceptions. 100% coverage.

Oh, and by the way, passkeys have been broken on PC/Linux when using Firefox for months:

> There Was A Problem: We encountered an error contacting the login service. Please try again in a few minutes.

Neat. You have to use Chrome or Edge.... For months, after making it mandatory...

bo1024 2026-02-28 05:49 UTC link
I thought the point of passkey security is that you don't have to send the private key around, it can stay on your device. Different passkey per device. Lose or destroy a device, delete that passkey and move on.
Glyptodon 2026-02-28 06:17 UTC link
I don't know about spring cleaning, but it's pretty easy to delete by accident if you connect to the browser or OS when setting up instead of the password manager.

That said, I've been assuming I could have multiple passkeys per site and that's turning out to not always be something websites behave sanely about.

orbital-decay 2026-02-28 06:17 UTC link
There's a big difference between being kept in the dark and being informed but careless.
mgrandl 2026-02-28 06:23 UTC link
I love passkeys in my selfhosted vaultwarden, but I agree the UX for older people is not quite there.
bad_username 2026-02-28 06:36 UTC link
> you can remember them, but are you also suggesting to not use generated passwords?

You can remember a strong generated password if it's a pass phrase. Better "rememberability" with the same amount of entropy.

bad_username 2026-02-28 06:39 UTC link
The author's concern of "misgendering" an imaginary person (with ab unambiguously female name) is quite odd.
utopiah 2026-02-28 06:40 UTC link
> They bind you to your device

Isn't it why good practice is to bind at least 2 hardware passkeys and/or have recovery codes?

Sure someone can steal your phone/laptop/yubikeybio but then you can use the NitroKey you have at home in your drawer to recover your account.

hrmtst93837 2026-02-28 06:51 UTC link
Generated passwords can be useful, but they come with challenges like management and security. It's better to adopt approaches like password managers or biometrics to enhance usability while maintaining security.
jesseendahl 2026-02-28 07:16 UTC link
>They bind you to your device/iCloud/Gaia account so if it gets stolen/banned you're out of luck

This is the biggest myth/misconception I see repeated about passkeys all the time. It's a credential just like your password. If you forget it, you go through a reset flow where a link is sent to your email and you just setup a new one.

And if it happens to be your Gmail account that you're locked out of, you need to go through the same Google Account Recovery flow regardless of whether you're using a password or a passkey.

cedws 2026-02-28 07:53 UTC link
There’s another foot gun I wrote about recently:

https://cedwards.xyz/passkeys-are-not-2fa/

Borealid 2026-02-28 08:44 UTC link
It does if you use microg or authnkey or keepassdx.

It's Play Services that does not support this combination, likely to shepherd you towards Google acoount usage. Alternate Android apps work fine.

shaky-carrousel 2026-02-28 08:57 UTC link
I truly don't see the advantage of passkeys over a password manager like bitwarden, with random passwords.
reddalo 2026-02-28 09:31 UTC link
I'm also completely against passkeys. A safe password and a good password manager are way better, they don't lock you into any platform.

It's super sad to see all kinds of websites offering you to add a passkey when you log in.

Telaneo 2026-02-28 09:50 UTC link
> And why are they "cleaning up" their passkeys in the first place?

The same reason they're cleaning up their Windows or system32 folder.

rcxdude 2026-02-28 09:58 UTC link
It's more likely for them to accidentally be deleted (or otherwise lost access): in my experience approximately zero users actually understand where their passkeys are stored, and they can be all over the place: the number one question I get is 'why can't I log in?' because they've accepted a passkey setup dialog on one machine without really reading it and now can't log in on another. Sometimes it's on the same machine but in different contexts. No passkeys should be considered something that the average user is going to reliably hold onto (in large part because the industry has been so keen to foist them on users but not very keen at all to educate them on how they work. This also makes them a lot less useful from a security point of view because it means you can't get rid of the recovery process, which tends to be the weaker link).
lxgr 2026-02-28 10:04 UTC link
Passkeys on iOS and macOS actually work quite well in that regard. They get stored in your provider of choice across the web, web views, apps etc., at least in my experience.

Mine is Bitwarden, and that's available on pretty much all platforms, natively where available (except on macOS currently), as a browser extension otherwise.

For the rare instance in which I need to authenticate using a passkey on a computer where I'm not logged into Bitwarden, there's the cross-device CaBLE flow where I can scan a QR code with my phone and use Bitwarden to authenticate. This works across OSes and browsers.

pibaker 2026-02-28 10:06 UTC link
If no one can implement a specification without causing problems here and there, perhaps we should consider the specification itself problematic.

See also: Bluetooth.

dariosalvi78 2026-02-28 10:15 UTC link
the problem so far is UI and incompatibility across devices, OSes etc. I am a big fan of Passkeys and the idea of using PRF for E2E encryption, but I wouldn't implement that as now, there is almost zero control over where those passkeys are, how I can recover them, how I manage them. Whenever I have to switch computer (mandatory policy at work), or phone (mandatory obsolence) or if I want to work across OSes (Mac for work, Windows for fun), everything falls apart, incomprehensible interfaces, inexistent transparency and control. And I'm a pro user that has actually studied how the standard works.

I'm afraid that it'll take some few more decades before we will get rid of passwords, if ever.

lxgr 2026-02-28 10:17 UTC link
You're thinking about hardware authenticators, not Passkeys. Passkeys are definitionally synchronized and backed up in the cloud (otherwise you just have a sparkling WebAuthN authenticator).

Proprietary clouds and sync backends create their own set of problems, but they do solve the availability issue of always having to register at least two different security keys with each service.

> to be honest, I wouldn't mind if google/Apple can take all my private data and passkeys hold them

That's exactly what you can do today!

> I show my ID they should allow me to setup my new phone.

You have to show them your phone number, which for better or worse is our age's "showing ID", but then you can indeed get back in.

lxgr 2026-02-28 10:20 UTC link
I think the idea behind PRF was something like "use this as one of several keys", never as "use this the only key". I don't think this was explicitly called out in the specs, though.

> this passkey is load-bearing for encryption, not just auth" so they can surface appropriate warnings before deletion

That sounds like a reasonable idea, but still doesn't help with the case of a completely deleted/destroyed authenticator, e.g. a lost Apple/Google account or Yubikey.

The only viable solution to me for mass adoption is restricting (by recommendation, since there's no way to programmatically enforce it) PRF to scenarios where it's only one out of several ways to get access back. Some password managers do this, e.g. they encrypt their master secret under a PRF-derived key, but this is not the only way/place to get to the master secret, and they also encourage printed key backups etc.

lxgr 2026-02-28 10:30 UTC link
I consider myself pretty sophisticated with passkeys (I wrote a toy implementation of WebAuthN once to understand them better), and yet I still get tripped up by this sometimes: Not via intentional deletion, but accidental overwriting.

As far as I understand, there are several ways to enforce per-account passkey uniqueness via WebAuthN, but every once in a while, some site will somehow not realize that I have a passkey for them available already, they will offer to create a new one for me, and my password manager (Bitwarden) will do this by overwriting the old/existing passkey.

Now consider a synchronization hiccup (updating my password manager storage and the relying party's backend is not atomic), and I could totally see my passkey get lost.

lxgr 2026-02-28 10:34 UTC link
Most password managers implementing passkeys only allow one passkey per account entry, and I've ended up with multiple passkeys per site, while the site only supports one (and deletes the others upon creating a new one), so I've been in the exact situation of not knowing which entries are safe to delete before.

This is usually due to relying party and possibly password manager bugs, but it does happen.

lxgr 2026-02-28 10:35 UTC link
> I actually despair about when my family members are forced into passkeys and then lose access to their accounts because they get a new device.

Both iOS and Android sync passkeys to their respective cloud accounts by default. (Of course, losing access to that account, sharing one across family members and causing confusion etc. are still concerns.)

The real problem is lock-in, as this effectively often prevents entire families from switching from iOS to Android or vice versa. I'd encourage anyone managing their family's tech setup to pick a platform-agnostic passkey implementation such as 1Password or Bitwarden for that reason.

Editorial Channel
What the content says
+0.80
Article 8 Right to Remedy
High Advocacy Framing
Editorial
+0.80
SETL
+0.63

Core advocacy. Content defends right to private data (encrypted messages, photos, documents) and warns against design practices that put privacy at risk. Advocates that users should understand and consent to how their private data is protected.

+0.80
Article 12 Privacy
High Advocacy Framing Practice
Editorial
+0.80
SETL
+0.63

Strong advocacy against arbitrary interference with privacy. Core argument: users suffer arbitrary loss of access to private data ('interference') because the coupling between credential and encryption is not transparent to them. Advocates for warnings and disclosure to prevent this arbitrary harm.

+0.70
Preamble Preamble
Medium Advocacy Framing
Editorial
+0.70
SETL
+0.53

Content invokes human dignity as foundational value. Frames data loss (encrypted personal memories) as violation of dignity and user agency. Emphasizes that users deserve to understand implications of their choices.

+0.70
Article 19 Freedom of Expression
High Advocacy Framing
Editorial
+0.70
SETL
+0.37

Strong exercise and advocacy of freedom of opinion. Author freely expresses concern about industry practice and calls for change. Opinion clearly labeled, concerns substantiated with technical reasoning and user scenarios.

+0.60
Article 3 Life, Liberty, Security
Medium Advocacy Framing
Editorial
+0.60
SETL
ND

Content advocates for data security as a fundamental aspect of personal security. 'Blast radius' framing emphasizes how credential loss cascades into security compromise of user's most sensitive data.

+0.60
Article 17 Property
Medium Advocacy
Editorial
+0.60
SETL
ND

Content advocates for users' property rights in personal data. Encrypted documents, photos, and digital assets are user property that can be arbitrarily lost. Advocates for design practices that protect users' ability to retain and access their property.

+0.50
Article 1 Freedom, Equality, Brotherhood
Medium Framing
Editorial
+0.50
SETL
ND

Content advocates that all users deserve equal protection and understanding regarding their data. Framing assumes equal dignity of all users (Erika example) and their equal right to protect personal assets.

+0.50
Article 27 Cultural Participation
Medium Framing
Editorial
+0.50
SETL
ND

Content advocates for protection of users' participation in cultural/personal digital life. Personal photos, messages, documents are expressions of cultural and personal identity. Data loss means loss of ability to participate in and preserve personal cultural archive.

+0.30
Article 21 Political Participation
Low Advocacy
Editorial
+0.30
SETL
ND

Indirectly advocates for user participation in standards/industry governance. Calls on identity industry to change course, implies users should have voice in how their data is protected through standards and platform governance.

+0.30
Article 25 Standard of Living
Low Framing
Editorial
+0.30
SETL
ND

Tangentially addresses right to adequate standard of living by advocating for digital security/data access as part of adequate modern life. Loss of encrypted data/backups harms user's ability to maintain digital life adequately.

+0.20
Article 16 Marriage & Family
Low Framing
Editorial
+0.20
SETL
ND

Tangential reference to family/home via 'photos of loved ones who are no longer here' as example of irreplaceable family data. Advocates protecting family memories and personal/family privacy.

ND
Article 2 Non-Discrimination

ND

ND
Article 4 No Slavery

ND

ND
Article 5 No Torture

ND

ND
Article 6 Legal Personhood

ND

ND
Article 7 Equality Before Law

ND

ND
Article 9 No Arbitrary Detention

ND

ND
Article 10 Fair Hearing

ND

ND
Article 11 Presumption of Innocence

ND

ND
Article 13 Freedom of Movement

ND

ND
Article 14 Asylum

ND

ND
Article 15 Nationality

ND

ND
Article 18 Freedom of Thought

ND

ND
Article 20 Assembly & Association

ND

ND
Article 22 Social Security

ND

ND
Article 23 Work & Equal Pay

ND

ND
Article 24 Rest & Leisure

ND

ND
Article 26 Education

ND

ND
Article 28 Social & International Order

ND

ND
Article 29 Duties to Community

ND

ND
Article 30 No Destruction of Rights

ND

Structural Channel
What the site does
Element Modifier Affects Note
Legal & Terms
Privacy
No privacy policy linked from page
Terms of Service
No terms of service linked from page
Identity & Mission
Mission
Personal technical blog; no explicit mission statement
Editorial Code
No editorial standards or ethics policy observed
Ownership
Personal blog of Tim Cappalli
Access & Distribution
Access Model
Free access, no paywall observed
Ad/Tracking
No advertisements or tracking scripts observed
Accessibility
No observable accessibility features or statements
+0.50
Article 19 Freedom of Expression
High Advocacy Framing
Structural
+0.50
Context Modifier
ND
SETL
+0.37

Blog platform permits open publication without editorial gatekeeping. No apparent censorship or suppression. Content is freely accessible.

+0.30
Preamble Preamble
Medium Advocacy Framing
Structural
+0.30
Context Modifier
ND
SETL
+0.53

Blog platform is neutral/permissive. No structural barriers to expression or access.

+0.30
Article 8 Right to Remedy
High Advocacy Framing
Structural
+0.30
Context Modifier
ND
SETL
+0.63

Blog itself respects reader privacy by not implementing the criticized practice. Platform is transparent about authorship and content.

+0.30
Article 12 Privacy
High Advocacy Framing Practice
Structural
+0.30
Context Modifier
ND
SETL
+0.63

Blog platform permits open discussion of this critique without interference or suppression.

ND
Article 1 Freedom, Equality, Brotherhood
Medium Framing

ND

ND
Article 2 Non-Discrimination

ND

ND
Article 3 Life, Liberty, Security
Medium Advocacy Framing

ND

ND
Article 4 No Slavery

ND

ND
Article 5 No Torture

ND

ND
Article 6 Legal Personhood

ND

ND
Article 7 Equality Before Law

ND

ND
Article 9 No Arbitrary Detention

ND

ND
Article 10 Fair Hearing

ND

ND
Article 11 Presumption of Innocence

ND

ND
Article 13 Freedom of Movement

ND

ND
Article 14 Asylum

ND

ND
Article 15 Nationality

ND

ND
Article 16 Marriage & Family
Low Framing

ND

ND
Article 17 Property
Medium Advocacy

ND

ND
Article 18 Freedom of Thought

ND

ND
Article 20 Assembly & Association

ND

ND
Article 21 Political Participation
Low Advocacy

ND

ND
Article 22 Social Security

ND

ND
Article 23 Work & Equal Pay

ND

ND
Article 24 Rest & Leisure

ND

ND
Article 25 Standard of Living
Low Framing

ND

ND
Article 26 Education

ND

ND
Article 27 Cultural Participation
Medium Framing

ND

ND
Article 28 Social & International Order

ND

ND
Article 29 Duties to Community

ND

ND
Article 30 No Destruction of Rights

ND

Supplementary Signals
How this content communicates, beyond directional lean. Learn more
Epistemic Quality
How well-sourced and evidence-based is this content?
0.76 medium claims
Sources
0.7
Evidence
0.7
Uncertainty
0.7
Purpose
0.9
Propaganda Flags
No manipulative rhetoric detected
0 techniques detected
Emotional Tone
Emotional character: positive/negative, intensity, authority
urgent
Valence
-0.1
Arousal
0.7
Dominance
0.5
Transparency
Does the content identify its author and disclose interests?
0.50
✓ Author ✗ Conflicts ✗ Funding
More signals: context, framing & audience
Solution Orientation
Does this content offer solutions or only describe problems?
0.76 mixed
Reader Agency
0.8
Stakeholder Voice
Whose perspectives are represented in this content?
0.38 2 perspectives
Speaks: individualsinstitution
About: userscorporationinstitution
Temporal Framing
Is this content looking backward, at the present, or forward?
mixed short term
Geographic Scope
What geographic area does this content cover?
global
Complexity
How accessible is this content to a general audience?
moderate medium jargon general
Longitudinal 968 HN snapshots · 8 evals
+1 0 −1 HN
Audit Trail 16 entries
2026-02-28 15:36 model_divergence Cross-model spread 0.33 exceeds threshold (4 models) - -
2026-02-28 15:36 eval_success Lite evaluated: Moderate positive (0.40) - -
2026-02-28 15:36 eval Evaluated by llama-4-scout-wai: +0.40 (Moderate positive) 0.00
reasoning
Editorial warning on passkey usage for data encryption
2026-02-28 15:22 eval_success Lite evaluated: Mild positive (0.20) - -
2026-02-28 15:22 eval Evaluated by llama-3.3-70b-wai: +0.20 (Mild positive) 0.00
reasoning
ED warns of passkey misuse
2026-02-28 15:22 model_divergence Cross-model spread 0.33 exceeds threshold (3 models) - -
2026-02-28 11:59 eval Evaluated by claude-haiku-4-5-20251001: +0.53 (Moderate positive) +0.24
2026-02-28 11:57 eval Evaluated by claude-haiku-4-5-20251001: +0.29 (Mild positive) +0.04
2026-02-28 10:53 eval Evaluated by claude-haiku-4-5-20251001: +0.25 (Mild positive)
2026-02-28 08:28 eval_success Light evaluated: Moderate positive (0.40) - -
2026-02-28 08:28 rater_validation_warn Light validation warnings for model llama-4-scout-wai: 0W 1R - -
2026-02-28 08:28 eval Evaluated by llama-4-scout-wai: +0.40 (Moderate positive)
reasoning
Editorial warning on passkey usage for data encryption
2026-02-28 08:28 eval_success Light evaluated: Mild positive (0.20) - -
2026-02-28 08:28 eval Evaluated by llama-3.3-70b-wai: +0.20 (Mild positive)
reasoning
ED warns of passkey misuse
2026-02-28 08:27 rater_validation_warn Light validation warnings for model llama-3.3-70b-wai: 0W 1R - -
2026-02-28 05:19 eval Evaluated by claude-haiku-4-5: +0.44 (Moderate positive)