Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot
    Watch how Apple 3D prints Watches by blasting powdered titanium with lasers

    Watch how Apple 3D prints Watches by blasting powdered titanium with lasers

    November 19, 2025
    Anthropic’s Claude Takes Control of a Robot Dog

    Anthropic’s Claude Takes Control of a Robot Dog

    November 19, 2025
    Adobe to acquire digital marketing platform Semrush for .9 billion

    Adobe to acquire digital marketing platform Semrush for $1.9 billion

    November 19, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » How to Stop Using Passwords and Start Using Passkeys
    Security

    How to Stop Using Passwords and Start Using Passkeys

    News RoomBy News RoomSeptember 5, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
    How to Stop Using Passwords and Start Using Passkeys

    In the event your device is lost or stolen, you can restore your passkeys using the account you created it with. For instance, Google allows you to store passkeys in the Google Password Manager and sync them across your devices. Windows and iCloud Keychain only work on their respective operating systems, but they’re tied to your Microsoft and Apple accounts, respectively.

    Are Passkeys Safe?

    Passkeys are safe, even more so than a long, random password. When you sign in with a passkey, you send a handful of information to the service you’re signing into, including your public key, which is stored as a representation of you as a user. This information alone doesn’t do anything.

    On the device where you created the passkey, you’ll have to engage in a “challenge” to unlock your private key, usually some form of biometric authentication. If the challenge is successful, it’s signed and sent back to the service you’re trying to log into. That challenge is then checked against the public key, and if it’s a match, you’re given access. Critically, this authentication happens on your device, not on a server far away.

    Although biometric authentication is how you’ll typically interact with passkeys on a mobile device, it’s not a requirement. On Windows, for example, you need to authenticate with Windows Hello, which can use your device’s PIN. On Android, you can use a pin or pattern.

    With a password, there’s a ton of room for an attacker to potentially steal your password. Data breaches might expose your password, and even if it’s encrypted, it can be cracked. Phishing schemes are an easy vector of attack for hackers looking to steal passwords. And, if you’re using a service with spotty security practices, you could have a password exposed as plaintext in a breach; there are dozens and dozens of examples of this happening before.

    Passkeys vs. 2FA and MFA

    Passkeys are tricky because they fly in the face of security conventions that have been around for years—namely, two-factor (2FA) or multifactor authentication (MFA). Although you don’t need to plug in a code from a text or copy something over from an authenticator app, passkeys inherently use multifactor authentication. It just happens so fast that it’s easy to miss.

    MFA is about adding additional layers of protection beyond your password. Instead of just your password, you need it and a code texted to you, for example. Passkeys already work that way. You need to match the public-private key pair, but you also need to authenticate that you have access to that private key. It’s not “something you know and something you own,” as 2FA is normally described, but it’s still two layers of authentication.

    Here’s how Shikiar describes it: “When you sign in, the service issues a cryptographic challenge that can only be answered with the private key on your device, verified by something you have (like your phone or laptop) and often something you are (like a biometric). The result is a phishing-resistant login with no reusable credentials to steal.”

    Devices and Browsers That Support Passkeys

    Passkeys are broadly integrated at an operating system level. If you’re using an OS that doesn’t natively support passkeys—i.e., Linux—you can still use them. However, you’ll need to use another device, like your phone, to scan a QR code and authenticate yourself, or a third-party password manager.

    Here are the operating systems that fully support passkeys:

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleReolink’s new floodlight cam has 360 vision and on-device AI
    Next Article Bose’s new QuietComfort Ultra headphones now support audio over USB-C

    Related Posts

    DOJ Issued Seizure Warrant to Starlink Over Satellite Internet Systems Used at Scam Compound

    DOJ Issued Seizure Warrant to Starlink Over Satellite Internet Systems Used at Scam Compound

    November 19, 2025
    DHS Kept Chicago Police Records for Months in Violation of Domestic Espionage Rules

    DHS Kept Chicago Police Records for Months in Violation of Domestic Espionage Rules

    November 18, 2025
    Scam Ads Are Flooding Social Media. These Former Meta Staffers Have a Plan

    Scam Ads Are Flooding Social Media. These Former Meta Staffers Have a Plan

    November 15, 2025
    The Government Shutdown Is a Ticking Cybersecurity Time Bomb

    The Government Shutdown Is a Ticking Cybersecurity Time Bomb

    November 14, 2025
    Zohran Mamdani Just Inherited the NYPD Surveillance State

    Zohran Mamdani Just Inherited the NYPD Surveillance State

    November 12, 2025
    An Anarchist’s Conviction Offers a Grim Foreshadowing of Trump’s War on the ‘Left’

    An Anarchist’s Conviction Offers a Grim Foreshadowing of Trump’s War on the ‘Left’

    November 12, 2025
    Our Picks
    Anthropic’s Claude Takes Control of a Robot Dog

    Anthropic’s Claude Takes Control of a Robot Dog

    November 19, 2025
    Adobe to acquire digital marketing platform Semrush for .9 billion

    Adobe to acquire digital marketing platform Semrush for $1.9 billion

    November 19, 2025
    TikTok is letting users control how much AI content they see

    TikTok is letting users control how much AI content they see

    November 19, 2025
    Razer’s Cobra HyperSpeed Is Not Your Standard Gaming Mouse

    Razer’s Cobra HyperSpeed Is Not Your Standard Gaming Mouse

    November 19, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Europe is scaling back its landmark privacy and AI laws News

    Europe is scaling back its landmark privacy and AI laws

    By News RoomNovember 19, 2025

    After years of staring down the world’s biggest tech companies and setting the bar for…

    DOJ Issued Seizure Warrant to Starlink Over Satellite Internet Systems Used at Scam Compound

    DOJ Issued Seizure Warrant to Starlink Over Satellite Internet Systems Used at Scam Compound

    November 19, 2025
    AI, my unexpected daily travel companion

    AI, my unexpected daily travel companion

    November 19, 2025
    Can a Hydroelectric Dam Really Make the Days Longer?

    Can a Hydroelectric Dam Really Make the Days Longer?

    November 19, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.