My recent feature on passkeys attracted significant interest, and a number of the 1,100-plus comments raised questions about how the passkey system actually works and if it can be trusted. In response, I’ve put together this list of frequently asked questions to dispel a few myths and shed some light on what we know—and don’t know—about passkeys. This FAQ will be updated from time to time to answer additional questions of merit, so check back regularly. This author will not be monitoring or responding to comments going forward but can still be contacted through email.


More

GlobeNewswire: Expanding the API Economy and CIAM with Passkeys, Identity Verification, and Decentralized Identity

The study illustrates successful implementations of CIAM solutions across various verticals and use cases. This…

Read More →

Business Reporter: Addressing the bias issue in biometrics

Bias in biometric identity systems still exists, but it is manageable, argues Andrew Shikiar at…

Read More →