The future of passwords: exploring the power of biometric passkeys
Monday, June 05, 2023
In this fast-paced technological era, the traditional password is nearing its end.

In this fast-paced technological era, the traditional password is nearing its end. Tech giants like Apple and Google have already embraced two-factor authentication (2FA), but now they're taking security to the next level by introducing an optional biometric layer.

So, what's wrong with passwords?

Well, simple and easily guessable words like "password" or "123456" are vulnerable to hacking. Even complex codes can be cracked in an instant with the help of computers capable of guessing millions of passwords per second.

To counter this, longer passwords are recommended as they exponentially increase the number of possible combinations, making them harder to guess.

However, using a different password for each app has become impractical in today's digital landscape. We often resort to writing down passwords on sticky notes or relying on password manager apps that can be compromised by hackers.

So, does two-factor authentication (2FA) solve these password issues?

While it adds an extra layer of security by requiring an additional verification step, it still relies on the user remembering the relevant password. However, 2FA remains susceptible to hacking through various means.

For instance, certain methods, such as password resets, can occasionally bypass the 2FA process. Additionally, hackers may employ tactics like "SIM-jacking" to gain control of your SIM card, redirecting text messages to their own device rather than yours.

So, what do the experts recommend?

To shed more light on the significance of biometric passkeys, I spoke with Serge Niyonkuru, a tech enthusiast, app developer, co-founder, and CEO of Dropawave, a mobility startup in Rwanda.

Niyonkuru recommends authentication methods that focus on verifying the user's identity rather than just their device. "This is where biometric passkeys come into play. Biometric authentication utilizes specialized sensors in devices to measure unique features of individuals, such as fingerprints, 3D facial dimensions, iris, retina, and palm vein patterns," he said.

Today's smartphones, laptops, and tablets are equipped with the necessary technology to accurately read and authenticate biometric data, providing a foolproof method of identification.

ALSO READ: Rwanda’s Digital ID: Iris scans, fingerprints help recovery when lost

Niyonkuru emphasized the benefits of biometric authentication in terms of both security and user experience.

"In today&039;s digital landscape, passwords are no longer sufficient to protect sensitive information. Biometric passkeys offer a more secure alternative by leveraging unique physical characteristics of individuals," Niyonkuru said.

"Not only do biometric passkeys provide stronger data security compared to passwords, but they also offer a seamless user experience. Users no longer need to remember complex passwords or go through the hassle of resetting them."

Niyonkuru further highlighted that implementing biometric authentication can bring significant advantages to startups, such as reducing costs and time to market.

"By incorporating biometric authentication, startups can streamline the user login process, eliminate the need for password recovery or resets, and enhance overall user satisfaction.

Additionally, the adoption of biometric passkeys can reinforce trust and credibility, attracting more users to their platforms," he added.

ALSO READ: Email-related fraud increasingly targeting Rwanda

Among the various types of biometric authentication, fingerprint recognition stands out as one of the most widespread and reliable methods. Each person&039;s fingerprint is unique, making it a perfect biometric identifier.

With the prevalence of mobile devices equipped with fingerprint sensors, fingerprint recognition has become widely adopted.

"The use of fingerprints as a passkey offers an unparalleled level of security. It is user-friendly, convenient, and ensures that only authorized individuals can access sensitive information or perform specific actions," Niyonkuru said.