Did you know 80% of hacks exploit passwords? Microsoft’s making passkeys the default for billions, paving the way for a safer, passwordless future!
Learn more: https://zerodaily.me/blog/2025-05-03-microsoft-passkeys-passwordless-default

Did you know 80% of hacks exploit passwords? Microsoft’s making passkeys the default for billions, paving the way for a safer, passwordless future!
Learn more: https://zerodaily.me/blog/2025-05-03-microsoft-passkeys-passwordless-default
Did you know 80% of hacks exploit passwords? Microsoft’s making passkeys the default for billions, paving the way for a safer, passwordless future!
Learn more: https://zerodaily.me/blog/2025-05-03-microsoft-passkeys-passwordless-default
Microsoft Makes New Consumer Accounts Passwordless by Default
#Microsoft #Passkeys #Passwordless #Cybersecurity #Authentication #Security #WorldPasskeyDay #WindowsHello #MicrosoftAccount #TechNews
alternate headline: “#Microsoft announces plan to permanently lock out millions of users from their accounts when their phone dies or is lost / stolen / replaced…”
Microsoft setzt auf passwortlose Zukunft: Neue Konten werden standardmäßig ohne Passwort erstellt. Stattdessen kommen sicherere Methoden wie #Passkeys zum Einsatz. #Microsoft https://winfuture.de/news,150676.html?utm_source=Mastodon&utm_medium=ManualStatus&utm_campaign=SocialMedia
74% of consumers are aware of #passkeys
69% of consumers have enabled passkeys on at least one of their accounts
More than half of consumers believe passkeys are both more secure (53%) and more convenient (54%) than passwords
https://fidoalliance.org/wpd-report-2025-consumer-password-passkey-trends/
Embracing Passkeys: Your Guide to a Password-less Future
As the tech industry shifts towards a password-less future, understanding passkeys and how to implement them is crucial for developers and users alike. This article provides ten essential tips to navi...
https://news.lavx.hu/article/embracing-passkeys-your-guide-to-a-password-less-future
@thenewoil
I use #diceware random words and have never used as few as 3 so this doesn’t surprise me. The author advocates for using #passkeys but I have so far resisted that advice from him and others. Using a #password mgr with a browser extension, passkeys seem to be only a small increase in utility. Also don’t like the “black box” aspect of passkeys: what are they, where are they locally, how secure is this system. Happy to hear how I am wrong to be a passkey skeptic.
The Future of Authentication: Understanding Passkeys vs. Passwords
As the tech world moves towards a passwordless future, understanding the mechanics of passkeys becomes crucial. This article delves into the differences between traditional passwords and passkeys, hig...
https://news.lavx.hu/article/the-future-of-authentication-understanding-passkeys-vs-passwords
Navigating the Transition from Passwords to Passkeys: A Technical Perspective
As the tech industry pushes towards a passwordless future, the adoption of passkeys faces significant hurdles. This article explores the technical intricacies of passkeys, their advantages over tradit...
I’ve been on a tear setting up hardware-bound #passkeys on my YubiKeys for services that support true passwordless.
It’s still regrettably rare, but Google, Microsoft, and Yahoo all support it, which does cover most people’s email.
My password manager has never done me wrong but it’s reassuring to know I can get into my most important accounts without it.
Bonus points to Microsoft for letting you completely remove your password from your account. You can’t phish something that doesn’t exist.
LemonLDAP::NG 2.21 is out!
This new release includes improvements on OpenID Connect and CAS protocols, Loki logger, public notifications and much more.
Read our release notes: https://projects.ow2.org/view/lemonldap-ng/lemonldap-ng-2-21-0-is-out/
@keno3003 (2/2) Der einzige Schutz dagegen ist, wenn man physische #FIDO2-Tokens verwendet ("device-bound passkeys" nur in der "roaming-authenticator"-Variante!), die das Auslesen des Geheimnisses prinzipiell ausschließen. Dies ist also die einzige wirklich Phishing-resistente Authentifizierungsmethode.
IMO sollten also die Tipps am Ende vom Video *mit Fokus auf Sicherheit* anders lauten:
- am besten 2 #FIDO2 HW-Tokens besorgen und für alle #Passkeys verwenden (für #IDAustria Österreich: https://www.oesterreich.gv.at/dam/jcr:972a25a0-65e6-4c2e-9422-a2e02ce16f2d/20230613_ID-Austria_FIDO.pdf)
- keine phishing-gefährdeten Fall-Back-Mechanismen verwenden: also nur den 2. FIDO2-Token
- jede 2FA ist besser als keine
- niemals Passwörter in die Cloud schicken (Cloud-PW-Manager)
HTH
@keno3003 ad "Das Problem mit Passkeys" https://www.youtube.com/watch?v=u7Ti-Jc-b3A&pp=ygUYZGFzIHByb2JsZW0gYmVpIHBhc3NrZXlz
Sorry, dass #Passkeys immer absolut resistent gegen #Phishing sind, stimmt leider nicht.
https://arxiv.org/abs/2501.07380
"Another concern could be social engineering, where a user is tricked into sharing a passkey with an account controlled by an attacker."
Meiner Interpretation nach ermöglicht also das Transferieren von Passkeys zu anderen Personen eindeutig Phishing-Methoden. Die sind vielleicht noch nicht in der Praxis aufgetaucht aber ausschließen kann man es keinesfalls.
(1/2)
I was surprised last night to see that the latest Yubikeys support 100 #Passkeys, as opposed to the previous limit of 32, but it still doesn't feel like the best solution.
Apropos #Passkeys: c't 3003 hat sich im letzten Video mit dem Thema Synchronisation des Schlüsselmaterials auseinandergesetzt. Die Möglichkeiten der Herstellerclouds oder eigener Passwortmanager werden kurz gezeigt. In Sachen User Experience gibt es für die geräteübergreifende Nutzung von Passkeys allerdings noch keine so gute Note...
Ich empfahl ja neulich auf den #clt2025 den Vortrag über #Passkeys, die man für #2fa oder bei manchen Anbietern auch als einzige Authentifizierungsmethode nutzen kann. Auch den Vortrag könnt Ihr nachschauen. Link und Materialien sind hier: https://chemnitzer.linux-tage.de/2025/de/programm/beitrag/188
Neue Microsoft-Anmeldung: Schöner, schlauer, sicherer
https://techupdate.io/microsoft/neue-microsoft-anmeldung-schoener-schlauer-sicherer/50240/
Endlich kommen #Passkeys in #Microsoft 365, dann hat das leidige Anmelden mit Passwort und 2FA endlich ein Ende https://stadt-bremerhaven.de/microsoft-fuehrt-modernes-design-und-passwortlose-anmeldung-ein/
@yacc143 FYI: #Passkeys and #FIDO2 (= "device-bound #passkey" which can be divided into "platform-" and "roaming-authenticators") are identical except the #cloud-sync mechanism (as of my current understanding).
So unfortunately, they get mixed up or are considered as totally different things. Both is wrong.
In reality, they are very similar except that FIDO2 hardware tokens ("device-bound passkeys" only in their "roaming-authenticator" variant) are designed that way, that Passkeys are not being able to extracted from the device (at least for the moment).
Therefore, users of HW tokens can't be tricked into transferring their passkey to a rogue third party, which is possible with all other Passkey variants. Therefore: passkeys are NOT #phishing-resistant in the general case.