Passkeys Could Abolish Password and its Loopholes  

Share post:

Passkeys, a new password framework, and an update to Apple’s newest operating system, iOS 16, may be the long-awaited solution for password vulnerabilities and compromised credentials.

Passkeys are designed to generate a unique pair of secret codes called keys, one of which is a public key stored on the website. The other is a private key stored on your device. Although the two keys are related, one cannot be used to obtain the other.

Instead of a password, your device will ask you to authenticate using its biometric unlock mechanism when you try to log in to a website, which will scan either your face or your finger. Passkey’s functionality is deliberately limited to devices that support biometric data. You can also use iCloud to back up your keys and share them on your Apple devices.

Once your biometric data has been validated, your device will use your private key to verify your identity for the website by completing a complex mathematical challenge issued by the website. Your private key will never be transmitted to the website.

The website can only verify the answer from your device using the public key you generated during registration. No one can pretend to be you unless they have your private key securely stored on your device. If a website is compromised, cybercriminals will be unable to use the public key alone.

The sources for this piece include an article in TheConversation.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, March 27, 2024 – A botnet exploits old routers, a new malware loader discovered, and more warnings about downloading code from...

This episode reports on a new network of 40,000 infected small and home office routers and other devices that are part of a criminal botnet

Cyber Security Today, March 25, 2024 – A suspected China threat actor going after unpatched F5 and ScreenConnet installations

This episode reports on a new campaign stealing email passwords ,the latest data breaches

A hacker’s view of the civic infrastructure: Hashtag Trending, the Weekend Edition for March 23rd, 2024

What does the civic infrastructure look like through the eyes of a hacker? The legendary general Sun Tzu in the Art of War said that in order to defeat your enemy, you must first understand your enemy. How do you do this? He said, “to know your enemy, you must become your enemy.” If we

Cyber Security Today, Week in Review for week ending Friday, March 22, 2024

This episode features discussion on lessons learned from the ransomware attack on the British Library, advice for managing expectations of IT/security teams, why firms are leaving Google Firebase unprotecte

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways