{"id":79855,"date":"2024-07-07T17:48:15","date_gmt":"2024-07-07T09:48:15","guid":{"rendered":"https:\/\/version-2.com\/?p=79855"},"modified":"2024-07-03T17:49:48","modified_gmt":"2024-07-03T09:49:48","slug":"passkeys-vs-passwords-which-is-better","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/07\/passkeys-vs-passwords-which-is-better\/","title":{"rendered":"Passkeys vs. passwords \u2014 which is better?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"79855\" class=\"elementor elementor-79855\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2493f1c elementor-widget elementor-widget-text-editor\" data-id=\"2493f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/05575fcdc6\/passkey-vs-password.png\/m\/1080x0\/filters:quality(75)\" width=\"1080\" height=\"607\" \/><\/p><div class=\"Article_wrapper__8_7eU\"><div class=\"richtext\"><h2 id=\"it\u2019s-not-if-but-how-you-authenticate\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">It\u2019s not <i>if<\/i> but <i>how<\/i> you authenticate<\/h2><p class=\"nord-text text-base leading-normal text-black\">Most online services and applications require you to log in before using them. There&#8217;s no way around it, as our identity and your right to access digital products must be verified. The methods for this verification can vary though: You might enter a PIN or password, use biometrics like a fingerprint or facial recognition, click on a link sent to your email, and more.<\/p><p class=\"nord-text text-base leading-normal text-black\">The most commonly used authentication method remains the traditional password. However, a new kid on the block called \u2018passkeys\u2019 has recently emerged, sparking discussions about its superiority to passwords. We will now delve into and share our perspective on this debate. But first\u2026.<\/p><h2 id=\"what-is-a-password-really\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">What is a password, really?<\/h2><p class=\"nord-text text-base leading-normal text-black\">Passwords have existed for hundreds, perhaps thousands, of years. However, in the pre-digital age, they were primarily verbal phrases you had to say aloud to gain access to restricted areas. If this gives you the &#8216;Open Sesame\u2019 vibes, you&#8217;re right on target.<\/p><p class=\"nord-text text-base leading-normal text-black\">These days, however, passwords inhabit the virtual realm as combinations of letters, numbers, and symbols that we use to authenticate and secure access to online accounts or systems. Their purpose is to protect our digital privacy and security, a role they have effectively fulfilled over time.<\/p><p class=\"nord-text text-base leading-normal text-black\">But the problem with many passwords is that they can be cracked. This is to say, if a password lacks enough complexity, cybercriminals can use modern hacking technologies to breach it, gaining unauthorized access to your accounts. For this very reason, many organizations have been searching for a successor to passwords for quite some time now\u2014and it appears they&#8217;ve found one in passkeys.<\/p><h2 id=\"\u2018sorry-what-is-a-passkey\u2019\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">\u2018Sorry, what is a passkey?\u2019<\/h2><p class=\"nord-text text-base leading-normal text-black\">It\u2019s difficult to come up with a simple definition of passkeys, but we will do our best to explain this term in the easiest way possible. Basically, <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/what-is-a-passkey\/\" data-ga-slug=\"Link to \/blog\/what-is-a-passkey\/\" data-link=\"NordUIlink\">passkeys<\/a> are a new type of credential consisting of two separate cryptography keys: a public key registered with the website or application and a private key stored locally on your device. During login, these keys must be paired to grant access.<\/p><p class=\"nord-text text-base leading-normal text-black\">What makes passkeys great is that biometric authentication tools on your device, such as fingerprint scanners or face ID, can initiate this pairing process, eliminating the need for passwords or other authentication factors.<\/p><p class=\"nord-text text-base leading-normal text-black\">As a result, using passkeys can not only enhance convenience but also significantly boost security by minimizing the risk of password theft. In other words, users can log into their online accounts much faster and with greater peace of mind regarding their cybersecurity.<\/p><p>\u00a0<\/p><h2 id=\"the-difference-between-passkeys-and-passwords\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">The difference between passkeys and passwords<\/h2><p class=\"nord-text text-base leading-normal text-black\">At this point, you should be able to distinguish between the two solutions, but we\u2019ll still break down the key differences between passwords and passkeys to make sure it\u2019s all clear. These are:<\/p><ul class=\"leading-loose List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">Passwords are user-created strings of characters, whereas passkeys are system-generated cryptographic keys.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">Passkeys are unique by default, while passwords are as complex as the user makes them.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">Passwords are stored on servers or databases, while passkeys consist of a public key stored on servers and a private key stored on a device.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">Passkeys enhance cybersecurity through their dual-key authentication system, unlike passwords, which depend on their complexity.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">Passwords are authenticated only via servers, whereas passkeys require pairing public and private keys, stored on the servers and the user\u2019s device, respectively.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">Users can change passwords, but managing passkeys usually requires specialized software.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">Passkeys provide strong protection against phishing and brute-force attacks, whereas passwords are inherently more vulnerable to such threats.<\/p><\/li><\/ul><h2 id=\"are-passkeys-safer-than-passwords\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Are passkeys safer than passwords?<\/h2><p class=\"nord-text text-base leading-normal text-black\">Although we briefly answered this question in the previous section, we would like to discuss the security aspect in more detail.<\/p><p class=\"nord-text text-base leading-normal text-black\">Passkeys are generally considered more secure than passwords, and there are several reasons for this claim. Firstly, passkeys do not need to be remembered or manually created, unlike passwords, which require you to come up with complex combinations of letters, numbers, and symbols and then try to memorize them.<\/p><p class=\"nord-text text-base leading-normal text-black\">Moreover, passkeys are generated automatically using cryptography, which splits credentials into two parts. So, in case of a data breach where an attacker accesses your public key, that key alone remains useless without the corresponding private key.<\/p><p class=\"nord-text text-base leading-normal text-black\">We also need to mention that major companies like Google, Microsoft, and Apple already support passkeys and are collaborating with organizations like the FIDO Alliance to ensure passkey implementation across platforms. This widespread adoption by industry leaders underscores their trust in passkeys as a safer alternative to passwords, enhancing overall security for their users.<\/p><h2 id=\"store-your-passkeys-and-passwords-in-a-secure-password-manager\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Store your passkeys and passwords in a secure password manager<\/h2><p class=\"nord-text text-base leading-normal text-black\">Being one of the first password managers to support passkey technology, <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/password-manager\/\" data-ga-slug=\"Link to \/password-manager\/\" data-link=\"NordUIlink\">NordPass<\/a> offers a cybersecurity solution that combines the best of both worlds, allowing you to securely and efficiently use passkeys and passwords.<\/p><p class=\"nord-text text-base leading-normal text-black\">With NordPass, encryption goes beyond just passkeys\u2014stored in its encrypted vault, your passwords are protected from unauthorized access. Additionally, features such as autosave and autofill make storing and filling in passwords quick and easy. NordPass also includes a Password Generator that can create complex passwords on the spot, preventing you from using weak or previously used passwords in the future.<\/p><p class=\"nord-text text-base leading-normal text-black\">NordPass effectively addresses common password challenges, empowering its customers to adopt more sophisticated security practices. Whether you prefer using passwords or aim to transition to a passwordless future, NordPass provides the flexibility and tools to support both choices. Which way you will go is up to you.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63567\" class=\"elementor elementor-63567\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45e3ec76 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"45e3ec76\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-311e216d\" data-id=\"311e216d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d9a2e6f elementor-widget elementor-widget-text-editor\" data-id=\"3d9a2e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordPass<br \/><\/strong>NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51a2bcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51a2bcf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c73a037\" data-id=\"c73a037\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-821bef5 elementor-widget elementor-widget-spacer\" data-id=\"821bef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>It\u2019s not if but how you authenticate Most online servic [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,973,1129,61],"tags":[1131,1272,974],"class_list":["post-79855","post","type-post","status-publish","format-standard","hentry","category-1273","category-nord-security","category-nordpass","category-press-release","tag-nordpass","tag-1272","tag-nord-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Passkeys vs. passwords \u2014 which is better? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordpass.com\/blog\/passkey-vs-password\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Passkeys vs. passwords \u2014 which is better? - Version 2\" \/>\n<meta property=\"og:description\" content=\"It\u2019s not if but how you authenticate Most online servic [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordpass.com\/blog\/passkey-vs-password\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-07T09:48:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/05575fcdc6\/passkey-vs-password.png\/m\/1080x0\/filters:quality(75)\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/passkey-vs-password\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/07\\\/passkeys-vs-passwords-which-is-better\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Passkeys vs. passwords \u2014 which is better?\",\"datePublished\":\"2024-07-07T09:48:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/07\\\/passkeys-vs-passwords-which-is-better\\\/\"},\"wordCount\":913,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/passkey-vs-password\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x597\\\/05575fcdc6\\\/passkey-vs-password.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"keywords\":[\"NordPass\",\"2024\",\"Nord Security\"],\"articleSection\":[\"2024\",\"Nord Security\",\"NordPass\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/07\\\/passkeys-vs-passwords-which-is-better\\\/\",\"url\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/passkey-vs-password\\\/\",\"name\":\"Passkeys vs. passwords \u2014 which is better? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/passkey-vs-password\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/passkey-vs-password\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x597\\\/05575fcdc6\\\/passkey-vs-password.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"datePublished\":\"2024-07-07T09:48:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/passkey-vs-password\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordpass.com\\\/blog\\\/passkey-vs-password\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/passkey-vs-password\\\/#primaryimage\",\"url\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x597\\\/05575fcdc6\\\/passkey-vs-password.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"contentUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x597\\\/05575fcdc6\\\/passkey-vs-password.png\\\/m\\\/1080x0\\\/filters:quality(75)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/passkey-vs-password\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Passkeys vs. passwords \u2014 which is better?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Passkeys vs. passwords \u2014 which is better? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordpass.com\/blog\/passkey-vs-password\/","og_locale":"en_US","og_type":"article","og_title":"Passkeys vs. passwords \u2014 which is better? - Version 2","og_description":"It\u2019s not if but how you authenticate Most online servic [&hellip;]","og_url":"https:\/\/nordpass.com\/blog\/passkey-vs-password\/","og_site_name":"Version 2","article_published_time":"2024-07-07T09:48:15+00:00","og_image":[{"url":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/05575fcdc6\/passkey-vs-password.png\/m\/1080x0\/filters:quality(75)","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordpass.com\/blog\/passkey-vs-password\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/07\/passkeys-vs-passwords-which-is-better\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Passkeys vs. passwords \u2014 which is better?","datePublished":"2024-07-07T09:48:15+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/07\/passkeys-vs-passwords-which-is-better\/"},"wordCount":913,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordpass.com\/blog\/passkey-vs-password\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/05575fcdc6\/passkey-vs-password.png\/m\/1080x0\/filters:quality(75)","keywords":["NordPass","2024","Nord Security"],"articleSection":["2024","Nord Security","NordPass","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/07\/passkeys-vs-passwords-which-is-better\/","url":"https:\/\/nordpass.com\/blog\/passkey-vs-password\/","name":"Passkeys vs. passwords \u2014 which is better? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordpass.com\/blog\/passkey-vs-password\/#primaryimage"},"image":{"@id":"https:\/\/nordpass.com\/blog\/passkey-vs-password\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/05575fcdc6\/passkey-vs-password.png\/m\/1080x0\/filters:quality(75)","datePublished":"2024-07-07T09:48:15+00:00","breadcrumb":{"@id":"https:\/\/nordpass.com\/blog\/passkey-vs-password\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordpass.com\/blog\/passkey-vs-password\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordpass.com\/blog\/passkey-vs-password\/#primaryimage","url":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/05575fcdc6\/passkey-vs-password.png\/m\/1080x0\/filters:quality(75)","contentUrl":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/05575fcdc6\/passkey-vs-password.png\/m\/1080x0\/filters:quality(75)"},{"@type":"BreadcrumbList","@id":"https:\/\/nordpass.com\/blog\/passkey-vs-password\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Passkeys vs. passwords \u2014 which is better?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-kLZ","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/79855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=79855"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/79855\/revisions"}],"predecessor-version":[{"id":79859,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/79855\/revisions\/79859"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=79855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=79855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=79855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}