Dec 27, 2025 · 5 min read · Introduction In 2025, Passkeys have truly entered the spotlight, especially in Japan. This surge in interest was triggered by a series of unauthorized login incidents targeting Japanese online brokerages, which highlighted the urgent need for more ro...
Join discussionDec 17, 2025 · 5 min read · We did not introduce passkeys to replace passwords. Passwords are still very much part of our system, especially as a fallback and for account recovery. The real problem we were trying to solve was repeated login friction. For product reasons, we do ...
Join discussion
Dec 10, 2025 · 1 min read · n today’s digital world, security isn’t optional—it’s expected. People log into their apps like banking systems, eCommerce stores, workplaces, and government portals every day. With cyberattacks increasing and traditional passwords becoming easier to...
Join discussionDec 9, 2025 · 8 min read · Most People Use the Wrong Protocol for SSO. But you will learn in this article how to choose right one. In this Article we are going to cover about some of the most used SSO methods why they are used, what’s the purpose, their competition and current...
Join discussion
Oct 18, 2025 · 9 min read · 1. Khái niệm và xu hướng đăng nhập không mật khẩu 1.1. Định nghĩa Đăng nhập không mật khẩu (passwordless login) là phương pháp xác thực người dùng mà không cần sử dụng mật khẩu truyền thống. Thay vào đó, hệ thống dựa vào các yếu tố duy nhất của người...
Join discussion
Sep 30, 2025 · 8 min read · Published: September 30, 2025 I'm absolutely ecstatic to announce the release of my second NPM package: @codenificient/passkey-auth! 🎉 After the success of my analytics SDK, I've been working tirelessly on something that I believe will fundamentally...
Join discussion
Aug 12, 2025 · 15 min read · In this tutorial, we will learn how to use SimpleWebAuthn to allow users to register and login with passkeys in a Next.js app. It assumes you have basic knowledge of Typescript and Next.js. We’ll be building this (live demo). If you’d rather dive hea...
Join discussionJul 11, 2025 · 7 min read · This article was originally posted on kevintech.ninja Did you know that 81% of data breaches are caused by weak or stolen passwords? As developers, we've all faced the challenge of securing user authentication while maintaining a smooth user experie...
Join discussionJun 7, 2025 · 2 min read · Passwords-based authentication has been the most common method of authentication for most services on the internet. While implementing password-based authentication is uncomplicated process , it presents various challenges. With the users signing up ...
Join discussion