Fixxx
Moderator
- Joined
- Aug 21, 2024
- Messages
- 815
- Reaction score
- 3,792
- Points
- 93

Passwords have become the foundation of digital security over 40 years ago, but Passkeys technology has the potential to replace them. This innovation promises to make logging into online services easier and safer at the same time. Cyber Media explores how access keys work, whether they are ready to completely replace passwords and what pitfalls users will face when switching to a new technology.
What is Passkeys
Passkeys is an authentication technology based on FIDO2 and WebAuthn standards. Instead of memorizing passwords, the system creates a unique pair of cryptographic keys for each service: public is sent to the server and private remains in the secure storage of the device. In simple terms, a key pair is created for each site - public and private keys. The private key remains on your device and is used to sign in to the site. Biometrics or PIN code on your phone only unlock access to this key. Thus, there is no password as such and there is nothing to steal. The main advantage of the technology is the impossibility of phishing. Passkeys remember the registration domain, so even a perfect copy of the site cannot obtain the user's signature. Authentication simply doesn't occur. Passkeys can be divided into two classes: software, synchronized through the password manager of the ecosystem and hardware, non-removable, located on a separate physical device, such as a USB/NFC token. To protect against phishing, Passkeys remember the domain on which you registered, so even a perfect phishing copy of the site cannot obtain your signature.
How to create and use Passkey
The implementation of Passkeys differs between ecosystems, although they are all based on the same standards.
Instructions for Apple
To use Passkey on Apple devices, first ensure that iCloud Keychain is enabled in Settings > [Your name] > iCloud > Passwords and Keychain. Then, on a site or in an application that supports Passkey, log in to your account, find the option to create a key, confirm the action with Face ID/Touch ID and the key will be automatically created and synchronized between your devices.
Instructions for Chrome
To create an access key (Passkey) in your Google account, go to your Google account settings on myaccount.google.com/security, select the Security section → Passkeys and electronic keys → Create passkey and follow the on-screen instructions to confirm your identity and select a device. To use it, log in to your account, select the Passkey option and confirm login with biometrics or PIN code of your device.
Passkeys vs. passwords
Passkeys implement a fundamentally different approach to multi-factor authentication. Instead of additional inconveniences for security, they combine convenience and security in one solution. The technology eliminates the main vulnerabilities of passwords: they cannot be stolen through database leaks, picked up by brute force or lured through phishing.
Main advantages of Passkeys
- Protection against phishing - keys are tied to a specific domain and do not work on fake sites
- No password leaks - private keys never leave the user's device
- Convenience of use - no need to remember complex passwords or enter SMS codes
- Quick authentication - login occurs in seconds through biometrics
- Multi-factority by default - automatically combines device ownership and biometrics
- Cross-platform - one key works in browsers and mobile applications
Key disadvantages and risks
- Binding to ecosystems - difficulties with transferring keys between Apple, Google and other platforms
- Dependence on the device - loss of a smartphone can mean loss of all accounts
- Problems with delegation - cannot transfer access to a colleague, like an SMS code
- Limited support - not all services and old browsers support the technology
- New attack vectors - compromise of the cloud account of the provider becomes critical
In which industries Passkeys are applied
The implementation of Passkeys technology is happening unevenly across industries. The leaders are sectors where speed of entry and high level of security are critically important, while laggards are conservative industries with outdated IT systems.
Leaders in implementation:
- Financial technologies and banking first appreciated the benefits of technology to protect against phishing and simplify login procedures. Large international banks and payment systems are actively testing and implementing Passkeys for critical operations.
- E-commerce and marketplaces use technology to reduce the number of abandoned carts due to authentication difficulties. Fast and secure login directly affects sales conversion.
- Technology giants: Google, Apple, Microsoft - naturally became pioneers, integrating support into their ecosystems and demonstrating the capabilities of the technology.
Laggard sectors:
- Government agencies and healthcare are slowly implementing Passkeys due to strict compliance requirements and long cycles of approval of changes in IT systems.
- Small and medium-sized businesses are often limited by budgets for modernization of IT infrastructure and depend on ready-made solutions from software suppliers.
- Legacy B2B platforms require significant investments to integrate modern authentication methods into outdated systems.
Conclusion
Passkeys represent an evolutionary leap in authentication, solving fundamental problems of password security. The technology eliminates the risks of phishing, password leaks and their selection, while simplifying the process of logging into online services. However, this is not a universal solution - it creates new challenges and dependencies. The main limitations remain binding to ecosystems, difficulties with portability of keys between platforms and dependence on devices. Losing a smartphone can mean losing access to all accounts and recovery is only possible through the service provider's procedures. However, transition to Passkeys is a global trend that will change the digital ecosystem in the coming years. The technology forces a rethink of approaches to cybersecurity, shifting the focus from protecting servers to ensuring the security of end devices.