My recent feature on passkeys attracted significant interest, and a number of the 1,100-plus comments raised questions about how the passkey system actually works and if it can be trusted. In response, I’ve put together this list of frequently asked questions to dispel a few myths and shed some light on what we know—and don’t know—about passkeys. This FAQ will be updated from time to time to answer additional questions of merit, so check back regularly. This author will not be monitoring or responding to comments going forward but can still be contacted through email.


More

The Verge: You can now sign into a Microsoft Account without a password using a security key

Microsoft is the first company to support passwordless authentication using FIDO2 WebAuthn and CTAP2 standards…

Read More →

Bank Info Security: State of the Authentication Landscape

In this Bank Info Security article, Shane Weeden, an authentication expert with IBM Security, discusses…

Read More →

Tech Target: How can U2F authentication end phishing attacks?

Tech Target reports on Google’s adoption of FIDO U2F security keys as a strategy to…

Read More →