Passkeys Explained: The Future of Password-Free Login

Passkeys replace passwords with biometric authentication backed by public-key cryptography. They're phishing-resistant, easier to use, and already supported by Apple, Google, Microsoft, and hundreds of services.

Passkey authentication using Face ID and fingerprint on iPhone and Android
1What Are Passkeys

What Is a Passkey and How Does It Replace a Password?

A passkey is a cryptographic credential stored on your device that replaces traditional passwords. Unlike a password — which is a shared secret that both you and the website know — a passkey uses public-key cryptography. When you create a passkey for a service, your device generates a unique pair of cryptographic keys: a public key that is shared with the website and a private key that never leaves your device. Authentication works by the website sending a challenge that your device signs with the private key, proving your identity without ever transmitting the private key itself.

From a user's perspective, logging in with a passkey feels exactly like using biometric authentication on to Spot and Avoid Attacks on Your Phone">your phone. You navigate to a website, click "Sign in with passkey" or simply begin the sign-in flow, and your device prompts you for Face ID, Touch ID, or Windows Hello. You authenticate with your face or fingerprint, and you're in. No username to type, no password to enter, no 6-digit code to check. The entire two-factor requirement — something you have (the device) plus something you are (the biometric) — is handled in a single seamless gesture.

The FIDO Alliance, an industry consortium including Apple, Google, Microsoft, and hundreds of other technology companies, developed and standardises the passkey specification. All major operating system platforms have implemented passkey support: Apple's iCloud Keychain syncs passkeys across Apple devices, Google Password Manager syncs passkeys across Android and Chrome on Windows and Mac, and Windows Hello and Microsoft Authenticator handle passkeys on Windows and across the Microsoft ecosystem. This cross-platform commitment makes passkeys a genuine, sustainable replacement for passwords rather than a proprietary vendor lock-in.

  • Public-key cryptography: Private key never leaves your device — only public key is shared with websites
  • Biometric authentication: Face ID, Touch ID, fingerprint, or Windows Hello unlocks the passkey
  • Two factors built in: Device possession (something you have) + biometric (something you are)
  • FIDO Alliance standard: Open standard supported by Apple, Google, Microsoft, and industry broadly
  • No password to leak: There is nothing to steal in a data breach — the server holds only a public key
  • Works across platforms: Synced passkeys available on iPhone, Android, Mac, Windows, and Chrome
Understand the cryptography behind passkeys and FIDO2 →
Passkey diagram showing public key on server and private key on device
2Security Advantages

Why Passkeys Are More Secure Than Passwords and 2FA Codes

Passkeys eliminate the entire category of password-based attacks. Credential stuffing attacks — where billions of leaked username/password combinations are tested against websites — cannot work against passkeys because there is no password to leak. Data breaches that expose databases of hashed passwords yield nothing useful when users have passkeys, because the server stores only the public key (which is designed to be public and cannot be used to impersonate the user). Brute force attacks and dictionary attacks against passwords are irrelevant when there is no password.

Passkeys are inherently phishing-resistant due to domain binding. The passkey authentication protocol cryptographically verifies the exact domain of the website requesting authentication. If a phishing site mimics Google's login page perfectly, any passkey associated with google.com will refuse to authenticate to a different domain like g00gle.com. This is a fundamental cryptographic guarantee, not a visual check that users must perform manually. Users cannot be tricked into authenticating to the wrong site — the security is automatic and does not depend on user vigilance.

Compared to TOTP authenticator app codes, passkeys are also more resistant to real-time phishing relay attacks. A TOTP code can theoretically be relayed from a phishing site to the real site within the 30-second validity window — the attacker sees your code and uses it instantly. With a passkey, the authentication is bound to the specific origin (domain) making the request, so relay is impossible. A passkey authentication to google.com cannot be used to authenticate to any other domain, even one controlled by the attacker.

  • No password to breach: Server holds only public key — data breaches cannot expose passkeys
  • Phishing-resistant: Domain binding prevents authentication to any site other than the legitimate one
  • No replay attacks: Each authentication includes a unique challenge — captured responses cannot be reused
  • No credential stuffing: Eliminates the attack that compromises billions of accounts annually
  • Biometric requirement: Stolen devices cannot be used without the user's biometric
  • TOTP upgrade: More resistant than TOTP to real-time phishing relay attacks
See the full comparison of phishing-resistant authentication methods →
Passkey security advantages over passwords and SMS codes
3Platform Support

Where Passkeys Work: Platforms and Services in 2026

Platform support for passkeys has expanded rapidly since Apple, Google, and Microsoft announced joint commitment in 2022. On Apple devices, passkeys are built into iOS 16+ and macOS Ventura+, stored in iCloud Keychain and synced across all your Apple devices. Creating a passkey on your iPhone automatically makes it available on your Mac and iPad without any additional setup. Apple's Safari browser has full passkey support, and iOS apps can also implement passkey authentication through the ASAuthorizationController API.

On Android, passkeys are handled by Google Password Manager (for Google account users) or third-party credential managers. Android 9+ devices support passkeys via the FIDO2 API. Google's own services — Google account sign-in, YouTube, Gmail — now support passkeys as a primary authentication option. Chrome on Windows, Mac, and Android supports passkeys through Google Password Manager. Windows users can create and use passkeys through Windows Hello (Windows 10/11), with options to use Face recognition, fingerprint, or a PIN as the biometric factor.

Service-level support is growing rapidly. In 2026, passkeys are supported by Google, Microsoft, Apple, Amazon, PayPal, GitHub, Shopify, Adobe, Coinbase, Kayak, and hundreds of other services. Major password managers including 1Password, Bitwarden, and Dashlane support passkey storage alongside traditional passwords. The FIDO Alliance maintains a public directory of passkey-enabled services. For Hong Kong users, local services are beginning to adopt passkeys — though HK banking apps are still in early stages of passkey evaluation as of 2026.

  • iPhone and Mac: iOS 16+ and macOS Ventura+ — stored in iCloud Keychain, synced automatically
  • Android: Android 9+ with Google Password Manager or compatible credential managers
  • Windows: Windows Hello on Windows 10/11 — face, fingerprint, or PIN
  • Major services: Google, Microsoft, Amazon, PayPal, GitHub, Adobe, Coinbase all support passkeys
  • Password managers: 1Password, Bitwarden, and Dashlane can store passkeys alongside passwords
  • HK banking: Local banks evaluating passkey support — traditional app 2FA is current standard
See what the full future of authentication looks like →
Passkey support across iPhone Mac Android Windows and major services
4Getting Started

How to Create Your First Passkey and What to Watch For

Creating a passkey is simpler than any other 2FA setup. On a supported service, look for "Create a passkey" in your account's security settings. When you click it, your browser or operating system will prompt you to confirm using your device's biometric authentication. Confirm with Face ID, Touch ID, or Windows Hello, and the passkey is created. The entire process takes about 10 seconds. The service stores your public key and associates it with your account. The private key is stored on your device, protected by your biometric.

The main practical concern with passkeys is what happens when you lose or replace your device. For synced passkeys (iCloud Keychain or Google Password Manager), your passkeys follow you to a new device when you sign in to your Apple ID or Google account. This means passkeys are more resilient to device loss than hardware security keys. However, it also means that the security of your Apple ID or Google account becomes crucial — a compromised iCloud account could give an attacker access to your synced passkeys. This is why your Apple ID and Google account should themselves be protected with the strongest available authentication.

One current limitation is that passkeys are not a complete password replacement yet for all scenarios. Many services still require a password as a fallback, and some websites are still in the process of implementing passkey support. For the near future, a practical strategy is to create passkeys for services that support them while maintaining strong, unique passwords (managed in a password manager) for services that do not yet support passkeys. As passkey adoption continues to grow, the password-only accounts in your life will progressively shrink.

  • Create a passkey: Security settings → Create passkey → Confirm with Face ID / Touch ID / Windows Hello
  • Synced passkeys: iCloud Keychain and Google Password Manager sync passkeys across your devices
  • Device loss: Synced passkeys survive device loss — access on new device via cloud account sign-in
  • Cloud account security: Protect your Apple ID and Google account strongly — they secure your passkeys
  • Not yet universal: Keep passwords for services that don't yet support passkeys
  • Coexistence strategy: Create passkeys where available; use strong password + authenticator app elsewhere
While passkeys grow, use an authenticator app for everything else →
Creating a passkey on iPhone and managing passkeys in settings

Start Using Passkeys Where You Can

Passkeys are available right now on Google, Apple, and hundreds of major services. Create your first passkey today and experience the future of authentication.

Related VPN Articles