Close Menu
Westside People
    Facebook X (Twitter) Instagram
    Westside People
    Subscribe
    • Home
    • Top News
    • World
    • Economy
    • science
    • Tech
    • sport
    • entertainment
    • Contact Form
    Westside People
    Home»Tech»How Apple, Google and Microsoft will kill passwords and phishing in one fell swoop
    Tech

    How Apple, Google and Microsoft will kill passwords and phishing in one fell swoop

    Avery KensingtonBy Avery KensingtonMay 6, 2022No Comments4 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
    How Apple, Google and Microsoft will kill passwords and phishing in one fell swoop
    Share
    Facebook Twitter Pinterest Reddit WhatsApp Email
    How Apple, Google and Microsoft will kill passwords and phishing in one fell swoop

    Getty Images

    For over a decade, we’ve been receiving promises that a world without passwords is right around the corner, and yet, year after year, this security nirvana has proven elusive. Now, for the first time, a workable form of passwordless authentication is about to become available to the masses in the form of a standard adopted by Apple, Google, and Microsoft that allows pass keys across platforms and across services.

    Pushed password-killing schemes in the past have had a host of problems. One of the main drawbacks was the lack of a viable recovery mechanism when someone lost control of the phone numbers or physical codes and phones associated with an account. Another limitation is that most solutions ultimately fail to be, in fact, truly passwordless. Instead, they gave users options to sign in with a face or fingerprint scan, but these systems eventually fell back to a password, meaning phishing, password reuse, and forgetting passcodes—all reasons we hated passwords to start with—why not Go away.

    new approach

    What’s different this time is that Apple, Google, and Microsoft all seem to be collaborating on the same well-defined solution. Not only that, but the solution is easier than ever for users, and it’s less expensive for big services like Github and Facebook. It has also been meticulously designed and reviewed by experts in authentication and security.

    A sample of what authentication without a password would look like.
    Zoom / A sample of what authentication without a password would look like.

    video alliance

    Existing Multi-Factor Authentication (MFA) methods have made significant strides over the past five years. Google, for example, allows me to download an iOS or Android app that I use as a second factor when I sign into my Google account from a new device. Based on CTAP – short for Client for authenticator protocol—This system uses Bluetooth technology to ensure that the phone is close to the new device and that the new device is, in fact, connected to Google and not a site masquerading as Google. This means that it is incorruptible. The standard ensures that the encryption secret stored on the phone cannot be extracted.

    advertisement

    Google also provides a file Advanced Protection Program Requires physical keys in the form of a standalone dongle or end user phones to authenticate logins from new devices.

    The big limitation now is that passwordless authentication and MFA authentication are rolled out differently – if at all – by each service provider. Some providers, such as most banks and financial services, still send one-time passwords via SMS or email. Realizing that these are not safe means of transmitting security-sensitive secrets, many services have moved to a method known as TOTP, which is an acronym for One time password based on time– to allow a second factor to be added, which effectively increases the password by a factor of “something I have”.

    Physical security keys and TOTPs, and to a lesser extent two-factor authentication through SMS and email are an important step forward, but three major limitations remain. First, TOTPs are generated through authentication applications and sent by text or email cheatable, the same way as regular passwords. Second, each service has its own closed MFA platform. This means that even when using non-separable forms of MFA – such as stand-alone physical keys or phone-based keys – the user needs a separate key for Google, Microsoft, and all other Internet properties. To make matters worse, each OS platform has different mechanisms for implementing the MFA.

    These issues give way to a third problem: the sheer lack of use for most end users and the counterintuitive cost and complexity that each service encounters when trying to offer MFA.

    Avery Kensington
    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleEU adjusts Russian oil sanctions plan in bid to win support from reluctant countries
    Next Article An NHL official was injured out of the ice during Game Three of the series between the Boston Bruins and the Carolina Hurricane

    Related Posts

    Samsung and Google Expand Galaxy XR Capabilities With Major Android XR Update

    April 10, 2026

    Android May Expand Its Edge Over iOS With New “Notification Rules” Feature

    April 3, 2026

    Google Prepares Screenless Fitbit Band to Challenge Whoop and Oura

    April 1, 2026

    Android Malware Steals Payment Card Data Using Never-Before-Seen Technique

    August 24, 2024

    Amazon is killing off a key feature on its $160 Echo after one year

    August 23, 2024

    Animal Crossing: Pocket Camp Will End Online Service in November

    August 23, 2024
    Add A Comment
    Leave A Reply Cancel Reply

    Navigate
    • Home
    • Top News
    • World
    • Economy
    • science
    • Tech
    • sport
    • entertainment
    • Contact Form
    Pages
    • Home
    • Privacy Policy
    • Editorial Policy
    • DMCA
    • About Us
    Facebook X (Twitter) Instagram Pinterest
    © © 2026 WestsidePeopleMag.com. Independent stories, culture, and community coverage. All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.