• Welcome to ASR. There are many reviews of audio hardware and expert members to help answer your questions. Click here to have your audio equipment measured for free!

Passkeys are working!

Has anyone found a reliable USB fingerprint reader for use with Windows Hello?

I've tried a couple, like this:

1754820888817.png


But they are so unreliable, that 9 times out of 10, it doesn't work and I have to sign in with my password anyway. :facepalm:

In contrast, I've had several cheap android phones where the fingerprint sign in rarely fails.
 
Hmmmm I have been getting pop up notices on my computer telling me that my password has been stolen and I need to make a new one. The problem is that I use the same password for ALL of my websites and accounts on the internet.. I only have to remember one password and I am always ready to go.. So I just delete all the windows and web sites notices on the password and just keep on going. So far nothing bad has happened and it has been going on for three years now. Om my Apple phone I have disabled face log on, fingerprint log in and turned off about 80% of all its features. My next phone might just be a Jitterbug. I want easy to use over everything else. I asked at the T-Mobile store (sells mainly Apple phones) if any brand made a stripped down phone for calling, texting and pictures. That is all I need. They said Sir, no one makes anything like that. So I walked out and kept my Iphone. Now if I could figure out how to rip out the big screen in the middle of the dashboard of my car I would delete that too. I don't need any of its features. No one sells stuff catering to people who don't use all the stuff that is in phones, cars and such. I may have outlived my usefulness......
 
The problem is that I use the same password for ALL of my websites and accounts on the internet.

You shouldn't really do that, but I get it, it's a real pain trying to come up with and remember, nice long, secure passwords for every account.

I use a password manager, that saves all my passwords and also generates long, secure passwords, like this, which you'd have little chance of memorising: h4@7#gRKFSdfxN4D

The one I use is Dashlane, but there are quite a few others and some of them offer a free version, with some restrictions:

 
Hmmmm I have been getting pop up notices on my computer telling me that my password has been stolen and I need to make a new one. The problem is that I use the same password for ALL of my websites and accounts on the internet..

:facepalm:
 
Hmmmm I have been getting pop up notices on my computer telling me that my password has been stolen and I need to make a new one. The problem is that I use the same password for ALL of my websites and accounts on the internet.. I only have to remember one password and I am always ready to go.. So I just delete all the windows and web sites notices on the password and just keep on going. So far nothing bad has happened and it has been going on for three years now. Om my Apple phone I have disabled face log on, fingerprint log in and turned off about 80% of all its features. My next phone might just be a Jitterbug. I want easy to use over everything else. I asked at the T-Mobile store (sells mainly Apple phones) if any brand made a stripped down phone for calling, texting and pictures. That is all I need. They said Sir, no one makes anything like that. So I walked out and kept my Iphone. Now if I could figure out how to rip out the big screen in the middle of the dashboard of my car I would delete that too. I don't need any of its features. No one sells stuff catering to people who don't use all the stuff that is in phones, cars and such. I may have outlived my usefulness......
Sometimes I feel the same. If I take a walk I simply enjoy walking and thinking. When I walk through my hometown there is so much to see, hear, smell and feel, that I would never think of the phone in my back pocket. But the majority of people is different: they walk on the pavement like zombies focused on the phone in their hand. Or they listen to music or podcasts isolating them sonically from the world around. Same with my car, which I could connect with a special app to my phone: it doesn't make sense to me because I own this car to drive it, nothing else. And I will be using passwords for the few requesting web sites I visit regularly for as long as they allow it.
 
I want easy to use over everything else. I asked at the T-Mobile store (sells mainly Apple phones) if any brand made a stripped down phone for calling, texting and pictures. That is all I need. They said Sir, no one makes anything like that. So I walked out and kept my Iphone.
Search for 'dumbphone' - you'll find a load of options. Some look like they did 20+ years ago. Others have a modern touchscreen, but with a simplified interface limited to calls, messages, contacts and settings - no internet, no apps.
 
Search for 'dumbphone' - you'll find a load of options. Some look like they did 20+ years ago. Others have a modern touchscreen, but with a simplified interface limited to calls, messages, contacts and settings - no internet, no apps.

Nokia still make several "dumb phones":

1754905075444.png



I thought about it myself, but Google Maps and being able to use the internet, when you're out and about, is occasionally very handy.
 
Is there the equivalent of "click here to recover your password"?
I haven't had to use it but with Google, you pick a 6 digit pin code for recovery.
 
You shouldn't really do that, but I get it, it's a real pain trying to come up with and remember, nice long, secure passwords for every account.

I use a password manager, that saves all my passwords and also generates long, secure passwords, like this, which you'd have little chance of memorising: h4@7#gRKFSdfxN4D

The one I use is Dashlane, but there are quite a few others and some of them offer a free version, with some restrictions:

Thanks! I will look at getting one.
 
Managed to fix passkey creation which previously generated an error. I highly recommend members create passkeys. Click on your alias up above. Go to Password and Security. And then select: Add Passkey. If you have never had one, procedure is a bit long as you are getting setup. From then on, it is a quick approval for any new passkeys you generate.

For those of you who don't know what passkeys are, they are a new form of account credentials that is far more secure and convenient than using username/password and 2 factor authentication. From ChatGPT:

"A passkey is a new and easy way to log into apps and websites without needing a password.

Simple explanation:​

Instead of typing a password, you use something you already have — like your fingerprint, face, or device PIN — to prove it's really you.

How it works:​

  • When you create a passkey, your device saves a special key (like a digital lock).
  • When you log in, your device uses your fingerprint or face to unlock that key.
  • That key tells the website: "Yes, this is really [Your Name]!"

Why it's good:​

  • No passwords to remember (or forget).
  • Harder for hackers to steal — they can't guess your fingerprint.
  • Works across devices — you can use your phone to log in on your computer.
Think of a passkey like a super-secure, invisible key that only your device can use — and only when you are using it."
biometrics? Nah
control via digital ID? Nah
enforced policy? tata

If it ain't bust, don't fix it.
 
If it ain't bust, don't fix it.
You realize that passkeys are an optional form of authentication?

Linux OSes have used something similar for decades. This never precluded password authentication unless the administrator made it so.
 
I'm not knowledgeable enough to determine if this is more secure or not, but I trust the opinions of others who seem to be in the know so I have created a passkey here and it went extremely well.

My question is, if the username and password I previously used still exists, do they not remain a vulnerability? Once passkey is used should the old credentials not be deleted?
 
I'm not knowledgeable enough to determine if this is more secure or not, but I trust the opinions of others who seem to be in the know so I have created a passkey here and it went extremely well.

My question is, if the username and password I previously used still exists, do they not remain a vulnerability? Once passkey is used should the old credentials not be deleted?
Just change the password to a random long password, and have it saved in a password manager. You don't need to remember it. https://1password.com/password-generator

I used to run an IT shop and was involved in security decades ago, in the world of large network routers (think telcos) and linux, openbsd, sun microsystems (RIP), etc. The safest network is the one NOT connected to the outside world. It's that simple. In our case here, this is not practical.

A long time ago, before the Internet, people just had a user name like 'bob', with a password like 'sunshine'. It was fine. It wasn't connected to millions of other nodes/networks, so we just left it alone. Security never got you more sales. Features and ease of use did.

Then we got encryption, and storing passwords. Even then, everyone knew there were vulnerabilities. As the Internet came online, everybody tried to invent their own authentication software. Many did it poorly. In addition, people hated remembering passwords, so they just used the same one everywhere.

As everything went online and people had hundreds of passwords, password managers started up. Then you can create unique passwords for every site, and have a master password for your own passwords. Most people still haven't caught up and are reusing passwords.

It is always assumed that a website will get hacked. Always. So that means all you can do is mitigate the risk by making sure that if someone steals your "AudioScienceReview' password, that's the only site they can abuse, and not your online bank, credit card, govt, etc. In an enterprise setting, depending on how secure it is, the IT shop can be aggressive in making people change passwords often (which ironically can lead to easy to guess passwords if no password manager is allowed) and have 2 factor authentication as well as VPN logins with hardware tokens. Essentially, multiple layers of authentication that are not dependent on each other. Most places do not do this.

All you can do is get a password manager, change all your website passwords to random passwords that get autofilled, enable 2 factor authentication (2FA), and protect your master password. Even then you can get hacked if your computer is compromised and they go after your master password, but that 2FA should help you. If you ever get a login notification that you didn't initiate, change your password immediately. You don't need to remember your password, because you can always just reset your password whenever you get logged out. It's not a big deal. The key being is that you are reducing your failure, not eliminating it.

Your email and phone number should be protected the most. Even though you can technically spoof phone numbers. Like I said, anything can be hacked given enough time. Layering security with multiple forms of security on top of passwords, like 2FA, passkeys, biometrics, hardware tokens, geographic limitations (if you live in country X, someone in country Y should not be able to log in) etc. is basically what we have to do.
 
My question is, if the username and password I previously used still exists, do they not remain a vulnerability? Once passkey is used should the old credentials not be deleted?
You still need the password as you will be asked for it when changing some of the security settings. Just make sure it's a strong password, and that you have a second factor enabled as @RoyRoyRoy said.
 
If it ain't bust, don't fix it.

Cool, d’ya mind if I send you a jpeg/zip file/mp4 file?, I promise I won’t embed any malicious software that will be able to bypass your pc’s security so I can hide on your desktop till I collect the data I need to clone your online accounts
 
Cool, d’ya mind if I send you a jpeg/zip file/mp4 file?, I promise I won’t embed any malicious software that will be able to bypass your pc’s security so I can hide on your desktop till I collect the data I need to clone your online accounts
If it's got your IP address in the header, prepare to be nuked by return! I'm a polymath, one of the hats I wear is white, and another black if required. If it hasn't I'll ping you to get it...or get you on a RAT of my own xoxo
 
If it's got your IP address in the header,

C’mon, I’d at least make the effort of using a burner 5g connection and then through tor or proxies, it may only make it hard but not totally impossible to track.
 
Tor and proxies. Switch off IPV6 too. TAILS if you're sensible.
 
Read
to get a grip on how passkeys actually work!

Let's hope that the audio statements are more correct than the passkey dito ;)
 
Passkey works in Apple Tahoe, Not Windows 11:facepalm:
 
Back
Top Bottom