A researcher developed an exploit that hijacks passkey authentication. The exploit depends on a non-trivial combination of pre-existing conditions. Neither the passkeys nor the protocol was proven to ...