Password managers could put an end to traditional key words

Traditional passwords could soon disappear with the launch of a new tool for authentication and modification of these security parameters

The move towards a new tool for modifying access keys to different platforms could declare the end of passwords as we know and use them until now.

The security provided by these keys made up of numbers, letters and special characters is invaluable, but they are increasingly seen as outdated. In this regard, technology companies have been working for years to offer simpler password managers.

The company FIDO Alliance, which works on the creation of open standards for key authentication, has spoken out on this matter. According to the company, the end of traditional passwords is near. “The organization is working on a tool to exchange unique access keys and other credentials between providers.”

They have pointed out that passwords “can be moved between different online services or password managers without compromising user security thanks to the Passkey Central tool. The idea has convinced industry giants such as Apple, Google or Samsung, who are interested in working with FIDO Alliance to develop this technology.”

Vulnerability of current keys

Cyberattacks do not stop, and digital criminals specialize in new ways to bypass barriers on different platforms. Currently, it is easier for hackers “to access victims’ sensitive information, and traditional passwords are no longer effective in retaining them. Access keys with providers protect users from phishing and facilitate login.”

The idea of ​​FIDO Alliance is to extend the use of access keys instead of passwords to more users so that they have control over their access formulas, in addition to facilitating the change of them. A clear example of how to securely transfer keys between administrators is by using “Passkey Central, where the Credential Exchange Protocol (CXP) and Credential Exchange Format (CXF) are used to securely transfer keys between administrators.” This way, users’ confidential information is never exposed.

M.Pino

Source: computerhoy

(Reference image source: FlyD in Unsplash)

Visit our news channel on Google News and follow us to get accurate, interesting information and stay up to date with everything. You can also see our daily content on Twitter and Instagram

You might also like