Mounting discussions about passkeys in tech and media.
Explanation of what passkeys are, why they’re needed, and specifics in the Microsoft ecosystem.
History of Authentication
Passwords: Initially used, but inherently weak.
One-Time Passcodes: Sent to users via text, but can be exploited.
FIDO v1: Used second strong authentication in the form of a fob.
Microsoft Authenticator App: Initial simple tap "Yes" replaced by requiring users to enter a number for more context and resistance to phishing (though susceptible to social engineering).
Strength of Authentication
Passwordless MFA: Included Microsoft Authenticator App.
Phishing-resistant MFA: Doesn’t include Authenticator App because it relies on human detection.
Phishing Vulnerabilities
Social Engineering Example: Described how a bad actor can trick a user into authenticating their session.
Vulnerability: No proof of the proximity of authenticator device.
Secure MFA Methods
Windows Hello for Business: TPM in the accessed machine.