{"id":29872,"date":"2025-06-06T13:27:25","date_gmt":"2025-06-06T13:27:25","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=29872"},"modified":"2025-06-25T15:00:02","modified_gmt":"2025-06-25T15:00:02","slug":"passwords-passkeys","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/","title":{"rendered":"No More Passwords: Meet Passkeys"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/blog.lacnic.net\/en\/author\/guillermo-pereyra\/\">Guillermo Pereyra<\/a>, Security Analyst<\/p>\n\n\n\n<p>Traditional passwords are no longer enough to protect our accounts. Every day we see data breaches, phishing attacks, and credential theft through malware. Even when using two-step authentication, users can fall for traps by entering their credentials on fake sites.<\/p>\n\n\n\n<p>That\u2019s where passkeys come in\u2014a new cryptography-based standard offering much stronger protection. In this article, we will look at how they work from a user\u2019s point of view and why they might mark the beginning of a password-free future.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a><strong>What Are Passkeys?<\/strong><strong><\/strong><\/h2>\n\n\n\n<p>Passkeys are based on public and private key cryptography. When you create a passkey for a website, a pair of cryptographic keys is generated: a private key that stays encrypted on your device (like your phone or computer), and a public key that is stored on the website\u2019s server.<\/p>\n\n\n\n<p>The following table shows some differences between passkeys and traditional passwords:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Feature<\/strong><\/td><td><strong>Passkeys<\/strong><\/td><td><strong>Passwords<\/strong><\/td><\/tr><tr><td>Storage<\/td><td>Private key on user\u2019s device<\/td><td>On server (with hash)<\/td><\/tr><tr><td>Creation<\/td><td>Automatically generated&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/td><td>Created by the user<\/td><\/tr><tr><td>Security<\/td><td>Very high (phishing, brute force, leaks, etc.)<\/td><td>Depends on complexity, 2FA use, and server-side protections<\/td><\/tr><tr><td>Ease of use<\/td><td>High<\/td><td>Depends on complexity<\/td><\/tr><tr><td>Theft protection<\/td><td>High<\/td><td>Low<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a><strong>How Passkeys Work<\/strong><strong><\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a>Creating a Passkey<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"412\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig3passkeys-1024x412.png\" alt=\"\" class=\"wp-image-29839\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig3passkeys-1024x412.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig3passkeys-300x121.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig3passkeys-680x274.png 680w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig3passkeys-768x309.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig3passkeys.png 1162w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Setting up a passkey is quick and typically located in your account\u2019s password settings. The name varies by platform\u2014for instance, Google calls them \u201caccess keys\u201d and Microsoft refers to them as \u201cpasskeys.\u201d<\/p>\n\n\n\n<p>After locating the option, the passkey is generated, and you choose where to store the private key: browser, password manager, or mobile device.<\/p>\n\n\n\n<p>If the same password manager is used across multiple devices, the private key will sync automatically, allowing site access from any of them.<\/p>\n\n\n\n<p>Here is an example of adding a Passkey in Google, saved to a mobile phone:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"829\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig4passkeys-en-1024x829.png\" alt=\"\" class=\"wp-image-29876\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig4passkeys-en-1024x829.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig4passkeys-en-300x243.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig4passkeys-en-407x330.png 407w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig4passkeys-en-768x622.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig4passkeys-en.png 1316w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"242\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig5passkeys-1024x242.png\" alt=\"\" class=\"wp-image-29845\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig5passkeys-1024x242.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig5passkeys-300x71.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig5passkeys-680x161.png 680w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig5passkeys-768x181.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig5passkeys-1536x363.png 1536w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig5passkeys.png 2040w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>During this process, the key pair is created: the private key remains on the client side and the public key is saved on the server.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Accessing a Website Using a Passkey&nbsp;&nbsp;<\/h2>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Find the Passkey option<\/strong> on the website:<\/li>\n\n\n\n<li>It may appear as \u201cPasskey\u201d or \u201cAccess key,\u201d depending on the translation.<\/li>\n\n\n\n<li>Some sites offer it directly; others must be selected manually.<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><strong>Enter your username.<\/strong><\/li>\n\n\n\n<li><strong>Choose where your private key is stored:<br><\/strong>It may be on your phone, computer, a security key, or the cloud.<\/li>\n\n\n\n<li><strong>Confirm your identity using your device\u2019s unlock method:<\/strong><\/li>\n\n\n\n<li>Fingerprint<\/li>\n\n\n\n<li>Facial recognition<\/li>\n\n\n\n<li>PIN or other configured method<\/li>\n<\/ol>\n\n\n\n<p><strong>Ready.<\/strong> You will access the site without typing or sharing a password.<\/p>\n\n\n\n<p>Examples of logins using Passkeys on Amazon and Google:<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"898\" height=\"792\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig6passkeys.png\" alt=\"\" class=\"wp-image-29848\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig6passkeys.png 898w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig6passkeys-300x265.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig6passkeys-374x330.png 374w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig6passkeys-768x677.png 768w\" sizes=\"(max-width: 898px) 100vw, 898px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"755\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig7passkeys-1024x755.png\" alt=\"\" class=\"wp-image-29851\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig7passkeys-1024x755.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig7passkeys-300x221.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig7passkeys-448x330.png 448w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig7passkeys-768x566.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig7passkeys.png 1270w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>It is important to configure multiple Passkeys for the same website, especially if you use different devices or separate password managers.&nbsp; This prevents losing access if the device storing your private key is unavailable. Having multiple Passkeys is recommended.<strong><br><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Characteristics of Passkeys<\/strong><strong><\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"511\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig10passkeys-1024x511.png\" alt=\"\" class=\"wp-image-29860\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig10passkeys-1024x511.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig10passkeys-300x150.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig10passkeys-662x330.png 662w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig10passkeys-768x383.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig10passkeys.png 1472w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Unlike traditional passwords, they are based on public-key cryptography.&nbsp; This makes them resistant to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Phishing<\/strong>. The user never exchanges passwords with the server.<\/li>\n\n\n\n<li><strong>Brute force attacks.<\/strong> These attacks are meaningless with this type of cryptography.<\/li>\n\n\n\n<li><strong>Credential leaks. <\/strong>If the server is compromised, leaking public keys poses no risk, as the private key remains protected on the user\u2019s device.<\/li>\n\n\n\n<li><strong>Malware theft. <\/strong>Resistant to info-stealer malware.<\/li>\n<\/ul>\n\n\n\n<p>They also eliminate the need to remember multiple complex passwords, simplifying their use.&nbsp; Thanks to their design, they enable quick and easy access from various devices while maintaining high security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Passkey Implementation and Adoption<\/strong><strong><\/strong><\/h2>\n\n\n\n<p>You can find a list of websites supporting this technology here:<\/p>\n\n\n\n<p><a href=\"https:\/\/passkeys.directory\">https:\/\/passkeys.directory<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"634\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig11passkeys-1024x634.png\" alt=\"\" class=\"wp-image-29863\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig11passkeys-1024x634.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig11passkeys-300x186.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig11passkeys-533x330.png 533w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig11passkeys-768x476.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig11passkeys.png 1288w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>A non-exhaustive list of clients that support Passkeys:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Password Manager<\/strong><strong><\/strong><\/td><td><strong>Included in OS<\/strong><strong><\/strong><\/td><td><strong>Browser Extension<\/strong><strong><\/strong><\/td><\/tr><tr><td><a href=\"https:\/\/1password.com\/\">1Password<\/a><\/td><td>&#8211;<\/td><td>Yes<\/td><\/tr><tr><td><a href=\"https:\/\/support.apple.com\/en-us\/120758\">Apple Passwords<\/a><\/td><td>Yes<\/td><td>&#8211;<\/td><\/tr><tr><td><a href=\"https:\/\/bitwarden.com\/\">BitWarden<\/a><\/td><td>&#8211;<\/td><td>Yes<\/td><\/tr><tr><td><a href=\"https:\/\/www.dashlane.com\/\">Dashlane<\/a><\/td><td>&#8211;<\/td><td>Yes<\/td><\/tr><tr><td><a href=\"https:\/\/passwords.google\/\">Google Password Manager<\/a><\/td><td>Yes<\/td><td>&#8211;<\/td><\/tr><tr><td><a href=\"https:\/\/www.keepersecurity.com\/password-tool.html\">Keeper<\/a><\/td><td>&#8211;<\/td><td>Yes<\/td><\/tr><tr><td><a href=\"https:\/\/www.lastpass.com\/\">LastPass<\/a><\/td><td>&#8211;<\/td><td>Yes<\/td><\/tr><tr><td><a href=\"https:\/\/learn.microsoft.com\/es-es\/windows\/security\/identity-protection\/passkeys\/\">Windows<\/a><\/td><td>Yes<\/td><td>&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a><a><\/a><strong>Pros and Cons<\/strong><strong><\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Advantages<\/strong><\/td><td><strong>Disadvantages<\/strong><\/td><\/tr><tr><td>Higher security: Prevents stolen or leaked passwords. Protection against info-stealers and data breaches.<\/td><td>Limited compatibility: Not all services support Passkeys.<\/td><\/tr><tr><td>Simple and fast authentication: Often just a fingerprint or PIN.<\/td><td>Ecosystem dependency: Passkeys aren\u2019t shared across Apple, Google, Microsoft.<\/td><\/tr><tr><td>Phishing-resistant: Cannot be reused or sent to fake sites.<\/td><td>Difficult on shared devices: May be tricky on non-personal devices.<\/td><\/tr><tr><td>No need to remember passwords: Automatically managed.<\/td><td>Learning curve:&nbsp; Users need to understand a new model.<\/td><\/tr><tr><td>Cloud sync: Usable on multiple devices (depending on platform).<\/td><td>&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>Passkeys represent an evolution in how we access digital services.&nbsp; By removing passwords and leveraging cryptography, they offer both security and simplicity. In future articles, we will explain how to implement this technology in applications and how to support users in adopting it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a><strong>References<\/strong><strong><\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/fidoalliance.org\">FIDO Alliance \u2013 Official site<br><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/passkeys.dev\">Passkeys.dev \u2013 Developer documentation<br><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/passkeys.directory\/\">Passkeys.directory \u2013 Compatible websites<br><\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>By Guillermo Pereyra, Security Analyst Traditional passwords are no longer enough to protect our accounts. Every day we see data breaches, phishing attacks, and credential theft through malware. Even when using two-step authentication, users can fall for traps by entering their credentials on fake sites. That\u2019s where passkeys come in\u2014a new cryptography-based standard offering much [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":29868,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[499],"tags":[1271],"archivo":[1345,1451],"taxonomy-authors":[1245],"tipo_autor":[],"class_list":["post-29872","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cibersecurity","archivo-editions","archivo-highlights-2023","taxonomy-authors-guillermo-pereyra-en"],"acf":{"author":"","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | No More Passwords: Meet Passkeys<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | No More Passwords: Meet Passkeys\" \/>\n<meta property=\"og:description\" content=\"By Guillermo Pereyra, Security Analyst Traditional passwords are no longer enough to protect our accounts. Every day we see data breaches, phishing attacks, and credential theft through malware. Even when using two-step authentication, users can fall for traps by entering their credentials on fake sites. That\u2019s where passkeys come in\u2014a new cryptography-based standard offering much [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-06T13:27:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-25T15:00:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/passkeys-062025.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"No More Passwords: Meet Passkeys\",\"datePublished\":\"2025-06-06T13:27:25+00:00\",\"dateModified\":\"2025-06-25T15:00:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/\"},\"wordCount\":784,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/passkeys-062025.jpg\",\"keywords\":[\"Cibersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/\",\"name\":\"LACNIC Blog | No More Passwords: Meet Passkeys\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/passkeys-062025.jpg\",\"datePublished\":\"2025-06-06T13:27:25+00:00\",\"dateModified\":\"2025-06-25T15:00:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/passkeys-062025.jpg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/passkeys-062025.jpg\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"No More Passwords: Meet Passkeys\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | No More Passwords: Meet Passkeys","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | No More Passwords: Meet Passkeys","og_description":"By Guillermo Pereyra, Security Analyst Traditional passwords are no longer enough to protect our accounts. Every day we see data breaches, phishing attacks, and credential theft through malware. Even when using two-step authentication, users can fall for traps by entering their credentials on fake sites. That\u2019s where passkeys come in\u2014a new cryptography-based standard offering much [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2025-06-06T13:27:25+00:00","article_modified_time":"2025-06-25T15:00:02+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/passkeys-062025.jpg","type":"image\/jpeg"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"No More Passwords: Meet Passkeys","datePublished":"2025-06-06T13:27:25+00:00","dateModified":"2025-06-25T15:00:02+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/"},"wordCount":784,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/passkeys-062025.jpg","keywords":["Cibersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/","url":"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/","name":"LACNIC Blog | No More Passwords: Meet Passkeys","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/passkeys-062025.jpg","datePublished":"2025-06-06T13:27:25+00:00","dateModified":"2025-06-25T15:00:02+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/passkeys-062025.jpg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/passkeys-062025.jpg","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/passwords-passkeys\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"No More Passwords: Meet Passkeys"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/passkeys-062025.jpg","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":29830,"post_title":"Desp\u00eddete de las contrase\u00f1as con Passkeys","slug":"passkeys-contrasenas","href":"https:\/\/blog.lacnic.net\/passkeys-contrasenas\/"},{"locale":"pt_BR","id":29880,"post_title":"Diga Adeus \u00e0s Senhas com Passkeys","slug":"senhas-passkeys","href":"https:\/\/blog.lacnic.net\/pt-br\/senhas-passkeys\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/29872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=29872"}],"version-history":[{"count":5,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/29872\/revisions"}],"predecessor-version":[{"id":30158,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/29872\/revisions\/30158"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/29868"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=29872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=29872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=29872"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=29872"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=29872"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=29872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}