X says goodbye to passwords on iPhone, this is the change with ‘passkeys’: what it means – 2024-03-06 09:22:23

by times news cr

2024-03-06 09:22:23

X (formerly known as Twitter) has launched a new login system for iPhone users in the United States.

Now, people will be able to access their accounts X using ‘passkeys’. Thus, they will have the possibility of logging into said social network quickly and protected using facial recognition or fingerprint with ‘Touch ID’.

The company run by Elon Musk has announced that it seeks to offer its users a more secure login method to increase the protection of your accounts and data.

The platform will allow traditional passwords to be replaced by an encrypted biometric authentication system to verify the identity of users.

This feature is only available on iOS devices in the United States. (X)

X has introduced ‘passkeys’ as a new login alternative for web users on iOS devices. This feature is currently only available in the United States.

‘Passkeys’ are described as a simple form of access, since the procedure is carried out entirely on the same device. Additionally, with these passwords, users can log into their accounts across devices without having to remember or reset forgotten passwords.

X has highlighted that the use of ‘passkeys’ is a more secure login method compared to conventional passwordsbecause these access keys are generated individually for each account, thus providing more defense against ‘phishing’ and unauthorized access.

In its help center, X has detailed that ‘passkeys’ are generated using public key cryptography belonging to the WebAuthentication standard.

Once the user registers with the new passwords, they can use their fingerprint or face to enter X. (Illustrative Image Infobae)Once the user registers with the new passwords, they can use their fingerprint or face to enter X. (Illustrative Image Infobae)

This means that, When registering an account, the user’s device creates a set of unique keys: one public, which is stored on X’s servers, and another private, which is kept only on the user’s device and is “never shared with X” to maximize security.

Once the password is established, users can log into their account using facial recognition or ‘Touch ID’ to confirm their identity.

To activate ‘passkeys’, users must go to ‘Account Settings and Privacy’ in their profile menu. Then, in ‘Security and account access’ choose ‘Security’. Within that section, access ‘Additional password protection’ and select ‘Password’.

Next, enter the password you are currently using and choose ‘Add a passcode’. Following the remaining instructions completes the setup for login with ‘passkeys’.

X said that passkeys, for the moment, will only be on iOS.  (Illustrative Image Infobae)X said that passkeys, for the moment, will only be on iOS. (Illustrative Image Infobae)

In addition, X “strongly” requested the use of these access codes to improve the security of the accountsbut clarified that they are not necessary to log in.

If a person loses or has their device stolen, their account will still be protected, X assured. The user will still be able to log into their account with their usual password.

The ‘passkeys’ are shared between the person’s devices through iCloud Keychain, which is like a digital keychain in the Apple cloud, thus ensuring that the person will have a backup copy in case they lose their device.

If the Apple and known as escrow.

X assured that the accounts on his social network will continue to be safe even if a theft or loss occurs.  (Illustrative Image Infobae)X assured that the accounts on his social network will continue to be safe even if a theft or loss occurs. (Illustrative Image Infobae)

An access key is a type of digital key that is linked to a person’s account on the Internet.

When using it, it is not necessary to enter the username and password every time you want to enter your account, because The private key that each one has automatically confirms who they arethanks to the fact that it communicates with a public key that is on the server.

In this way, the session starts automatically. In addition, these keys are created without the person doing anything and since there is no need to memorize access data, it is easier to use them. Also, if you have to recover them, there is a secure system that allows you to do it without problems.

By: Infobae

You may also like

Leave a Comment