Everyday Security in an Online World

Use Passkeys

The case for passkeys

In the last two chapters you learned the importance of protecting your online accounts with strong, unique passwords. You also learned that this is easier said than done, and that password managers can help. Next, you learned that by combining passwords with two-factor authentication, the security of an account is greatly improved.

But passwords are still a liability for both website operators and customers, and two-factor authentication can be a hassle. So, for several years, computer scientists have been working on an alternative that’s easier and safer. The result is passkeys.

The technology underlying passkeys is an open standard managed by a non-profit organisation, which ensures that passkeys are widely compatible with apps and devices from different manufacturers including Apple, Google and Microsoft.

Matching pairs

A passkey is a unique association between you and a website. It’s not something you have to come up with yourself; but it’s not just a long, random password either.

In fact, there are really two keys involved: one kept secret by your device, and one stored by the website. The keys are mathematically linked such that your device can prove its identity to the site without actually sending the secret key.

Security benefits

Unlike a password, you can’t be tricked into typing a passkey into a fake website (for more on phishing, see Recognise Social Engineering). In fact, when logging in with a passkey there’s no box to type in at all — it happens behind the scenes. And even if a scammer did prompt you for your secret key, you wouldn’t know what to type.

Next, unlike a human, a browser can’t be tricked by a subtly misspelt web address or a convincing spoof of a popular site: it will only automatically use a passkey on the site to which it belongs.

Finally, passkeys are secure enough by themselves that they remove the need for two-factor authentication in routine use. At the time of writing, the extent to which different services allow you to sign in solely with a passkey (skipping a one-time code, for example) remains to be seen; but in theory, passkeys make signing in quicker and easier than ever.

Creating passkeys

Some websites will prompt you to set up a passkey when you sign in. Otherwise, you can go to the page for managing your account; typically the link is in the top-right corner. If the website supports passkeys, you’ll find the option to create one under a heading like ‘security’ or ‘sign-in options’.

A web browser offering to create a passkey

Behind the scenes, creating and storing the key pair is the job of either:

Using passkeys

Your computer, tablet or phone stores passkeys securely, but you don’t need to remember a new code or master password to actually log into websites with them: you just use the same fingerprint, face recognition, PIN or password you use to unlock the device. Your browser selects the passkey that matches the website you’re using, and performs the necessary ‘handshake’ to log you in.

A web browser offering to use a passkey with biometric approval

Note that your biometric information, PIN or device password isn’t shared with the website. In fact, it never leaves your device. Rather, these means of authentication are simply how you consent to using the passkey.

Syncing passkeys

The major industry players – and others, including companies making password managers – have created ways to sync passkeys between your devices via their respective cloud services (for more on password managers, see Use Strong, Unique Passwords).

In doing so they have carefully considered the safety of the stored keys, which would be a goldmine for hackers. They’re encrypted using a PIN or equivalent – chosen by and known only to each customer – so that the company itself can’t read them. This means that even if the whole company is breached, or compelled to give access to a law enforcement agency, everyone’s passkeys will still be safe.

Cross-device authentication

In some cases, you can use a passkey stored on one device to log in on another. So, you might use a passkey stored on your phone to log into a website on your computer — even if the devices aren’t syncing passkeys. This is called cross-device authentication.

For example, on your computer, you’d choose the option to use a passkey from another device. The computer then shows a QR code. You point your phone’s camera at the QR code to scan it, and Bluetooth is used to exchange the necessary information.

A web browser offering cross-device authentication

Hardware tokens

You can optionally buy a hardware token to store your passkeys. This is a small gadget that looks much like a flash drive (memory stick) and connects to your computer via USB. For extra security, you might choose one with a fingerprint reader so that no one else can use it if it’s lost or stolen.

Lost passkeys

While passkeys are convenient for day-to-day use, they don’t supplant the older authentication options you’ve previously set up. If for any reason you lose your passkeys, you can still log into the site using your password and two-factor authentication.

It’s likely that in future, more accounts will go passwordless — but they still won’t rely on passkeys exclusively. You’ll still register a phone number, authenticator app or hardware token – or print a recovery code – in case you lose your passkeys.

If you found this useful, you can support my work by buying me a coffee.