My recent feature on passkeys attracted significant interest, and a number of the 1,100-plus comments raised questions about how the passkey system actually works and if it can be trusted. In response, I’ve put together this list of frequently asked questions to dispel a few myths and shed some light on what we know—and don’t know—about passkeys. This FAQ will be updated from time to time to answer additional questions of merit, so check back regularly. This author will not be monitoring or responding to comments going forward but can still be contacted through email.


More

MSSP Alert: authID Integrates with Ping to Spread Passwordless Authentication

authID’s decision this month to integrate its biometric identity verification technology with Ping Identity’s PingOne…

Read More →

Ars Technica: Coming to Apple OSes: A seamless, secure way to import and export passkeys

Apple OSes will soon transfer passkeys seamlessly and securely across platforms. Apple this week provided…

Read More →

Passwordless Authentication and the Rise of Passkeys: Expert Insights Podcast with Andrew Shikiar

Andrew Shikiar, Executive Director and CEO of the FIDO Alliance, joins us to discuss the…

Read More →