
Sign up to save your podcasts
Or
Passkeys use something called public key cryptography. They have your public key. And because it’s public, it doesn’t matter if anyone gets it. That public key and your private key combine to validate who you are.
But how does that work? Wouldn’t they have to know something besides the public key that’s unique to you? No. That’s the brilliance of it.
Featuring Tom Merritt.
Link to show notes here.
Hosted on Acast. See acast.com/privacy for more information.
4.9
5454 ratings
Passkeys use something called public key cryptography. They have your public key. And because it’s public, it doesn’t matter if anyone gets it. That public key and your private key combine to validate who you are.
But how does that work? Wouldn’t they have to know something besides the public key that’s unique to you? No. That’s the brilliance of it.
Featuring Tom Merritt.
Link to show notes here.
Hosted on Acast. See acast.com/privacy for more information.
3,015 Listeners
829 Listeners
892 Listeners
38,655 Listeners
2,013 Listeners
1,371 Listeners
1,309 Listeners
3,669 Listeners
1,381 Listeners
296 Listeners
880 Listeners
10,114 Listeners
943 Listeners
966 Listeners
136 Listeners