Passkeys - Threat modeling and implementation considerations | SlashID Blog

In this blog post, we review the current state of the technology from a security standpoint and we’ll discuss some critical aspects of passkey implementation.