Passreplaces have been the primary method of authentication and secure access to websites for decades. However, passwords pose various problems, such as complexity and human error in password security and authorization steps. This is where Passkeys come into play. Sayonnha Mandal, a cybersecurity researcher, explains how Passkeys may soon become the newest cybersecurity trend. Passkeys are digital credentials that are stored on your phone or computer. They are similar to physical keys, with the difference that you need to sign in to your device (using a personal identification number or biometrics like fingerprint or face recognition) to access them. Moreover, a hacker would need to physically possess your device to break into your accounts.
How Passkeys Work
Passkeys are generated through public-key cryptography. They consist of a long private key, a long string of encrypted characters, created for a specific device. Websites cannot access the value of the passkey. Rather, the passkey verifies that a website possesses the corresponding public key. Thus, you can use the passkey on your phone to access a website using another device. If you lose your phone, the passkey can be stored securely in the cloud with the phone’s other data, which can be restored to a new phone.
Why Passkeys Matter
Password security is a significant concern since passwords can be easily guessed, phished or otherwise stolen. Security experts advise users to create longer passwords with more characters, mixing alphanumeric and special symbols. However, even with all these precautions, there is no guarantee of airtight security since hackers continuously develop and use software exploits, hardware tools, and ever-advancing algorithms to break these defenses. With Passkeys, the onus is removed from users to create, remember and guard all their passwords since they are generated through public-key cryptography.
Passkeys vs. Passwords
Passkeys offer several advantages over passwords. It would take significant computational power and time to break and guess the private key, with brute force attacks being infeasible. In contrast, with passwords, even strong ones can be vulnerable, primarily due to human error. Moreover, Passkeys are more convenient since you don’t have to remember passwords for each account and don’t need to use two-factor authentication.
Conclusion and Recommendations
As technology evolves, so do the practices of cybersecurity. Passkeys are likely to soon overtake passwords and password managers, with Apple, Google, and Microsoft supporting their usage instead of passwords. However, it will take time for websites to add support for Passkeys, so passwords aren’t going to go extinct overnight. IT managers still recommend that people use a password manager like 1Password or Bitwarden. Furthermore, while Passkeys offer an added convenience and security, cybersecurity experts shouldn’t discount the importance of continuing to educate individuals on preventive measures, such as avoiding suspicious emails, keeping software up to date, and using virtual private networks (VPNs). Cybersecurity experts and malicious hackers are locked in an arms race, and while Passkeys may provide an extra layer of security against cyber threats, they are by no means the ultimate solution.
<< photo by Antoni Shkraba >>
You might want to read !
- Intelligence documents leak on Discord exposes vulnerabilities in online gaming communities
- Microsoft Urges Swift Action Against State-Backed Attackers Exploiting PaperCut Vulnerability
- Spain’s Police Cracks Down Major Criminal Organization, Arrests Hackers.
- “The rise of smart homes: Privacy concerns and the impact on personal data”
- “How Mental Health Apps’ Data-Collection Tactics Can Pose a Threat to Your Privacy: A Guide to Staying Safe”
- “The Unsettling Reality: Over a Million Websites at Risk Due to Active Exploitation of New WordPress Plugin Flaw”
- The Risky Business of Third-Party Scripts: Mitigating Cybersecurity Threats to Websites.
- The Netgear Router Saga: Vulnerabilities Leave Users Open to Cybersecurity Threats