My recent feature on passkeys attracted significant interest, and a number of the 1,100-plus comments raised questions about how the passkey system actually works and if it can be trusted. In response, I’ve put together this list of frequently asked questions to dispel a few myths and shed some light on what we know—and don’t know—about passkeys. This FAQ will be updated from time to time to answer additional questions of merit, so check back regularly. This author will not be monitoring or responding to comments going forward but can still be contacted through email.


More

Dark Reading: Passwords Use Alone Still Trumps Multi-Factor Authentication

Dark Reading reports on theJavelin Strategy & Research’s 2017 State of Authentication Report, commissioned by…

Read More →

New York Times: Google’s Key to Strong Password Protection Runs Into Limits

John Sabin, a former hacker for the National Security Agency, says Google’s Advanced Protection Program…

Read More →

Infosecurity: Strong Authentication Still Elusive for Businesses

According to a new Javelin Strategy & Research “2017 State of Authentication Report,” sponsored by…

Read More →