
Answers to the most frequently asked questions about Passkeys
Despite their growing adoption, Passkeys remain a mystery to many. In this article, we aim to answer some of the most common questions we receive. The answers are as objective as possible, outlining both the strengths and weaknesses of this technology.
How Do Passkeys Resist Phishing?
Unlike a password, a Passkey’s value is not chosen by the user. It is a random value generated by an underlying security mechanism (Yubikey, Apple Passwords, Windows Hello, etc.) and tied to a specific domain. While the human eye can be tricked by similar URLs, it’s impossible to fool a computer in the same way.
I Don’t Want to Collect Biometric Data…
One of the strengths of Passkeys is that fingerprint or facial recognition can be easily used as an authentication factor. Given the sensitivity of this type of data and the restrictions imposed by laws like Law 25, it’s natural to be cautious. However, it’s important to understand that biometric data is never shared with the website you’re trying to access! It’s the underlying mechanism (like Apple Passwords or Windows Hello) that uses biometrics to use the Passkey.
Why Is It More Secure Than a Password?
Passwords have two main weaknesses: they are limited by human memory and must be shared with the site the user wants to access. These weaknesses open the door to various attacks such as credential stuffing, brute-forcing, or just poor implementation by developers.
Passkeys solve both problems. First, the Passkey value isn’t chosen by the user and is theoretically impossible to guess with modern tech. Second, by using asymmetric cryptography, no sensitive value ever needs to be shared with the website! This difference is critical: even if you don’t trust a site’s developers, you can safely share the public part of your Passkey.
Is It Easy to Add Passkeys to My Site?
No, implementing a Passkey mechanism yourself is relatively complex. The specifications are full of nuances, and building a quality user experience is no small feat. Luckily, most authentication platforms (like Auth0, AWS Cognito) offer easy integration. If you still want to go ahead with a custom implementation, the Tour of WebAuthn is highly recommended reading.
Do Passkeys Only Work for the Web?
No, iOS and Android have APIs that allow Passkeys to be used in native mobile apps. This enables a seamless experience where a user who registers on a website can later log in on the mobile app.
Why Is Passkey Adoption Limited?
Aside from the implementation complexity, the main limitation is syncing Passkeys across the user’s devices. When syncing is available, the experience is amazing! But when it’s not, Passkeys can be quite frustrating.
For instance, I love signing up on a site using Touch ID on my Mac and later accessing it with Face ID on my iPhone. However, if I use a Windows laptop and an iPhone, native sync isn’t possible. Access created on my laptop won’t work on my phone.
Note
It is possible to use solutions such as 1Password to synchronize passkeys across different ecosystemsWhat Is the Real Security Impact?
A system’s security is only as strong as its weakest link.
As mentioned earlier, the weakness of Passkeys lies in the need for a unified ecosystem to fully benefit from them. This reality requires a recovery mechanism in case a Passkey is lost — and this is the weak link! No matter how secure Passkeys are, make sure an attacker can’t exploit this recovery process.
Conclusion
To keep this article accessible, we voluntarily omitted some of the more technically complex topics. If you have questions about hybrid protocols, resident keys, attestations, or anything else, feel free to reach out 🙂
Other articles



.webp)
.webp)



Oct 29, 2024
AI driving innovation: A new Era for Mobile Apps and User Experience
Artificial intelligence (AI) represents a digital transformation that impacts us all. This rapidly advancing technology, fueled by data analysis, not only enables informed decision-making and reliable forecasting but also allows for the completion of many tasks at a faster pace.


Oct 15, 2024
Pierre-Étienne Bousquet guest of "Les Affaires"
Our president and co-founder, Pierre-Étienne Bousquet, discussed with Jean-François Venne from Les Affaires the significant growth of digital technology in the retail industry and its impact on online sales, which are becoming increasingly crucial for revenue.

Sep 24, 2024
Cybersecurity and Mobile Applications: Choosing the Right Authentication Method
Mobile applications are essential tools that handle personal data, access sensitive information, and are part of our daily lives. However, in an age where the term cybersecurity is on everyone's lips, ensuring the security of these applications and the information they contain is crucial.





.png)

.png)

.webp)
.webp)
Mar 31, 2025
Ratings & Reviews: Their Impact on an App's Success
An app’s success isn’t solely based on meticulous engineering or eye-catching designs. It’s crucial to deliver a product that is high-performing, accessible, useful, and user-friendly, alongside a go-to-market (GTM) strategy tailored to the digital product ecosystem.



.webp)
.webp)



Oct 15, 2024
Enhancing Product Management: Key to Success in Software Development
The distinction between product management and project management is essential for ensuring optimal productivity. It’s not enough to treat them as interchangeable concepts; it’s crucial to adopt a proactive approach to place the right resources in the right places.




.png)
Jun 14, 2024
Recruiting an In-House Team or Hiring an Agency for Developing Your Application?
When embarking on a project as significant and important as developing an application, a crucial dilemma quickly arises: choosing between a specialized agency or recruiting your own in-house team to accomplish the work. One thing is certain, both options present distinct advantages and constraints.



May 22, 2024
Optimizing Synergy with Your Software Development Partner
The digital realm, especially that of custom digital solution development, is constantly evolving—between fast technological advancements and changing consumer needs, it's quite challenging to predict what the future holds for web players.

.png)
May 3, 2024
Simplified Infrastructures for Enhanced Agility
At Thirdbridge, we believe that project-oriented teams deliver superior quality results, and do so more quickly. Given that they are responsible for the entire value creation flow, these teams can increase their velocity by eliminating bottlenecks themselves. Moreover, entrusting end-to-end flow responsibility to our developer teams makes their work even more engaging and motivating.