top of page

Systems • Identity • Trust

Human Factors

SITH

2

Passkeys and Passwordless Login: Why Shared Secrets Are the Problem

  • Writer: Rich Greene
    Rich Greene
  • 6 days ago
  • 3 min read

Passwords have been the cornerstone of online security for decades, yet they continue to fail us. The core issue lies in how passwords prove identity: by sharing a secret that can be copied and reused. This fundamental flaw creates a massive security challenge on the internet. We reuse passwords, simplify them for convenience, fall for phishing scams, and companies often store them insecurely. Automated attacks like credential stuffing exploit stolen username-password pairs by testing them across multiple sites, causing widespread breaches.


To reduce these breaches, we need a new approach that proves identity without sharing secrets. Passkeys offer this solution. Instead of typing a password, your device generates a private key that never leaves it. The website holds a matching public key, which is useless on its own. When you sign in, your device proves it has the private key without revealing it. This method eliminates passwords, phishing, and leaked password databases. It verifies who you are, not just what you typed.



Why Passwords Fail at Scale


Passwords rely on a shared secret between you and the service. This secret is vulnerable in several ways:


  • Reuse: People often use the same password across multiple sites. If one site leaks credentials, attackers try those credentials everywhere.

  • Simplification: To remember passwords, users pick simple or predictable ones, making guessing or brute force easier.

  • Phishing: Attackers trick users into entering passwords on fake sites, stealing the secret directly.

  • Poor Storage: Some companies store passwords insecurely or use weak hashing, making breaches more damaging.

  • Credential Stuffing: Automated tools test stolen username-password pairs on many sites, exploiting reuse and weak passwords.


These problems create a cycle of breaches and stolen accounts that frustrate users and companies alike.


How Passkeys Change the Game


Passkeys use public key cryptography to prove identity without sharing secrets. Here’s how it works:


  • Your device creates a private key that never leaves the device.

  • The website stores a public key linked to your account.

  • When you log in, your device signs a challenge from the site using the private key.

  • The site verifies the signature with the public key.

  • No password is typed or transmitted, so phishing and reuse become impossible.


This approach has several benefits:


  • Phishing drops because there is no password to steal.

  • Reuse disappears since no password exists to reuse.

  • Logins get faster with biometric or device-based authentication.

  • Support calls fall as users no longer forget passwords.

  • Security improves by eliminating password databases that can leak.


The New Challenge: Account Recovery


While passkeys improve login security, they shift risk to account recovery methods. When attackers cannot steal passwords, they target:


  • Weak reset processes

  • Backup email accounts

  • Stale or compromised phone numbers


Recovery becomes the new perimeter that attackers try to breach. This means users and companies must:


  • Secure backup emails by verifying and monitoring them

  • Store recovery codes securely offline

  • Keep multiple trusted devices for recovery options

  • Use strong multi-factor authentication (MFA) on recovery channels


Living in a Hybrid World


Not all services support passkeys yet, so users must navigate a mix of password and passwordless logins. To stay secure:


  • Protect your email first, since it controls resets for many accounts.

  • Enable passkeys wherever available.

  • Use strong MFA methods like authenticator apps or hardware keys when passkeys aren’t an option.

  • Avoid SMS-based MFA due to its vulnerabilities.

  • Regularly review and update recovery options.


Practical Steps to Reduce Risk Today


To get the most benefit from passkeys and improve your overall security:


  • Enable passkeys on services that support them, such as Apple, Google, and Microsoft accounts.

  • Secure your email by enabling MFA and verifying backup options.

  • Use authenticator apps or hardware tokens for MFA on sites without passkeys.

  • Keep recovery codes offline and store them safely.

  • Maintain multiple trusted devices to avoid lockout.

  • Regularly audit your accounts for outdated recovery info.


These steps reduce risk more effectively than memorizing yet another password.



Passkeys offer a clear path to stronger, easier login security by removing shared secrets from the equation. While the transition requires attention to recovery methods and hybrid login environments, the benefits are significant. By adopting passkeys and securing recovery channels, users and companies can reduce breaches, improve user experience, and build a safer internet.


 
 
 

Comments


bottom of page