> But it wouldn't something that could be stolen off bitwarden.
Hah. I'm not the only one thinking about ways to use AWS KMS for it!
But the attacker can still impersonate you and ask the HSM service to sign data for them.
Ideally, I really want a system with a proof of physical interaction. The existing HSM APIs are not well-suited for that. But if you can trust the software that runs on the service that provides the HSM access, then this can be done with minor caveats on macOS.
Sure, I'd have to be online then to use a passkey stored in bitwarden. But it wouldn't something that could be stolen off bitwarden.
And I could reasonably protect bitwarden with a physical passkey.