
Sign up to save your podcasts
Or


This Podcast comprehensively discusses passkeys as a cutting-edge, passwordless authentication method built on public-key cryptography. It explains that passkeys involve a private key stored securely on a user's device and a public key held by the service, enabling login through simple actions like fingerprint or PIN, thus replacing traditional passwords. The discussion highlights the necessity of passkeys due to the inherent weaknesses of passwords, such as vulnerability to phishing, data breaches, and brute-force attacks, while improving user experience. It details the robust security of passkeys, particularly their phishing resistance and the fact that no sensitive data leaves the device, making them significantly safer than passwords. However, it also meticulously outline vulnerabilities, including risks associated with device theft, malware, session hijacking, implementation flaws, and challenges in account recovery and cross-platform compatibility, though these are generally less severe than password-related risks.
By HelloInfoSecThis Podcast comprehensively discusses passkeys as a cutting-edge, passwordless authentication method built on public-key cryptography. It explains that passkeys involve a private key stored securely on a user's device and a public key held by the service, enabling login through simple actions like fingerprint or PIN, thus replacing traditional passwords. The discussion highlights the necessity of passkeys due to the inherent weaknesses of passwords, such as vulnerability to phishing, data breaches, and brute-force attacks, while improving user experience. It details the robust security of passkeys, particularly their phishing resistance and the fact that no sensitive data leaves the device, making them significantly safer than passwords. However, it also meticulously outline vulnerabilities, including risks associated with device theft, malware, session hijacking, implementation flaws, and challenges in account recovery and cross-platform compatibility, though these are generally less severe than password-related risks.