Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

You'll No Longer Need to Set a Password With New Microsoft Accounts
CNET ^ | May 2, 2025 | Samantha Kelly

Posted on 05/03/2025 10:38:56 AM PDT by Openurmind

Microsoft is optimistic that our reliance on passwords is coming to a close.

Microsoft is once again moving closer to a passwordless future.

In a bold step toward embracing passkeys – which uses cryptography to better protect data from hackers and phishing scams – new Microsoft accounts will now be passwordless by default. Instead, the company will issue a prompt to set up passkeys as part of an effort to make the process more secure.

The need to get a better grasp on password protection comes at a time when many big tech companies are pushing to eliminate passwords altogether. Apple rolled out passkeys as part of iOS 16 in 2022, followed by Google, which allows people to sign in to Google and other popular accounts such as Amazon, WhatsApp and PayPal via fingerprint, face scan, PIN or pattern using a device's lock screen.

Now when a new Microsoft user attempts to enter a password and set up a "one time code" on their account, the company will prompt them to sign in with the code instead of the password and then encourage them to enroll a passkey. When they visit again, they'll be prompted to sign in with the passkey – not a password. Meanwhile, existing users can visit their account settings to delete their password.

(Excerpt) Read more at cnet.com ...


TOPICS: Computers/Internet; Conspiracy
KEYWORDS:
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-64 next last
To: TexasGator; lefty-lie-spy

“Nope. Anyone can enter passwords. No encryption.”

From MS themselves:

“How are passwords stored in Active Directory?
Passwords stored in AD are hashed. Meaning that once the user creates a password, an algorithm transforms that password into an encrypted output known as a “hash”. Hashes are of fixed size so passwords of different lengths will have the same number of characters. They are designed to be one-way encryption so that once they are coded, no one should be able to break that code (theoretically).”

https://learn.microsoft.com/en-us/answers/questions/848370/salting-and-hashing


21 posted on 05/03/2025 11:55:32 AM PDT by Openurmind
[ Post Reply | Private Reply | To 14 | View Replies]

To: TexasGator
Nope. Anyone can enter passwords. No encryption.

Passwords are hashed (one-way encryption) when stored in a database so if your account data is stolen they don't have your password.

When you enter your password what you enter is hashed and compared to the hash in the database to confirm you entered the correct password.

22 posted on 05/03/2025 11:57:57 AM PDT by E. Pluribus Unum (Democrats are the Party of anger, hate and violence.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Openurmind

Uh-huh. I recently navigated this fiasco just to access a shared folder at work.

Train wreck. Great concept, poorly implemented. This on top of security changes affecting ms & google email to take effect in the Fall; I have little hope the latter will be much better.

Somebody please advise as to the predicted disaster which may occur if one loses/replaces their phone.


23 posted on 05/03/2025 12:15:41 PM PDT by logi_cal869 (-cynicus the "concern troll" a/o 10/03/2018 /!i!! &@$%&*(@ -)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Openurmind

I made the grave mistake of signing onto HP’s automatic printer ink delivery program, which detects when your ink is low and sends it to you before you need it—NEVER, EVER do this— I loaded in a spare cartridge I bought at the store when I bought the printe, and HP detected that was not a cartridge from the Big Brother program, even though it was a genuine HP cartridge from the store; THEY REMOTELY DISABLED MY PRINTER!!! And when I tried to contact them or access my account, it would not process. I will NEVER own another HP product.

Ever.


24 posted on 05/03/2025 12:23:13 PM PDT by _longranger81
[ Post Reply | Private Reply | To 1 | View Replies]

To: logi_cal869

“Somebody please advise as to the predicted disaster which may occur if one loses/replaces their phone.”

Even if it will even let you enter it into a field who is going to be able to remember a 256 bit encryption key?


25 posted on 05/03/2025 12:25:36 PM PDT by Openurmind
[ Post Reply | Private Reply | To 23 | View Replies]

To: _longranger81

I don’t subscribe to ANY subscription services. It doesn’t matter if it is Hardware, Software or other technology. I use Free Linux Mint and LibreOffice which are all free, but i do give them voluntary donations when I chose to. IMHO.


26 posted on 05/03/2025 12:27:00 PM PDT by Pol-92064
[ Post Reply | Private Reply | To 24 | View Replies]

To: _longranger81

HP has been bad about this for years... Back when if you opted to load their driver in instead of just trusting MS plug and play drivers the HP software would take over your computer.

And I mean take it over, you would literally have to ask HP before you could do ANYTHING on your computer. Everything you did had an HP popup box you had to deal with before you could go any further.

The printer software would literally commandeer your box as if THEY owned it. You were lucky it didn’t disable your computer also until you satisfied HP...


27 posted on 05/03/2025 12:31:21 PM PDT by Openurmind
[ Post Reply | Private Reply | To 24 | View Replies]

To: Pol-92064

“I don’t subscribe to ANY subscription services. It doesn’t matter if it is Hardware, Software or other technology. I use Free Linux Mint.”

Same here... No one owns us or our machine.


28 posted on 05/03/2025 12:33:37 PM PDT by Openurmind
[ Post Reply | Private Reply | To 26 | View Replies]

To: backpacker_c

This has nothing to do with Microsoft.

93% of ALL cybersecurity breaches occur due to phishing. Ninety three percent... The grand majority of those are stupid simple passwords. Cryptographic keys such as YubiKeys are secure and phishing resistant, because you have to be in physical control of the key for it to work. It requires that you touch a button to activate it. It’s impossible for threat actors to leverage these, and they go elsewhere.

There’s no economy for threat actors when passkeys are adopted universally. The idea is to make it nearly impossible for a threat actor to establish a beachhead by making it impossible to login with a password. This is good practice and should be adopted.


29 posted on 05/03/2025 12:33:44 PM PDT by rarestia (“A nation which can prefer disgrace to danger is prepared for a master, and deserves one.” -Hamilton)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Openurmind

Active Directory professional here. The passwords are stored in AD in a hash, yes, but tools like Mimikatz allow threat actors to get the hash out of the LSASS process on your machine and literally present the hash to login. It’s far and away the most common method to move laterally in a compromised corporate environment.


30 posted on 05/03/2025 12:35:05 PM PDT by rarestia (“A nation which can prefer disgrace to danger is prepared for a master, and deserves one.” -Hamilton)
[ Post Reply | Private Reply | To 21 | View Replies]

To: rarestia

I understand hashing is not foolproof. And there are applications such as Corporate where this might be handy and needed. But this new MS feature should be an opt in feature. They are going to mandate it default across the board with no choice. In other words, they own your machine and you have no choice.


31 posted on 05/03/2025 12:39:19 PM PDT by Openurmind
[ Post Reply | Private Reply | To 30 | View Replies]

To: I want the USA back
After reading the article I have no idea what a passkey IS.

My exact response too. What is a passkey? Doesn't explain in the article.

32 posted on 05/03/2025 12:40:39 PM PDT by Inyo-Mono
[ Post Reply | Private Reply | To 8 | View Replies]

To: Openurmind

they’ll be prompted to sign in with the passkey – not a password.

And the difference is???


33 posted on 05/03/2025 12:44:19 PM PDT by Adder (End fascism...defeat all Democrats.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rarestia

“This has nothing to do with Microsoft.”

Of course it does... This is MS forcing this feature by default against everyone’s choice.

Of course there is a problem, but it is not the right of MS to claim ownership of your machine and force you to use it whether you want to or not.


34 posted on 05/03/2025 12:44:58 PM PDT by Openurmind
[ Post Reply | Private Reply | To 29 | View Replies]

To: Openurmind

And WITHOUT their phone.


35 posted on 05/03/2025 12:46:11 PM PDT by logi_cal869 (-cynicus the "concern troll" a/o 10/03/2018 /!i!! &@$%&*(@ -)
[ Post Reply | Private Reply | To 25 | View Replies]

To: E. Pluribus Unum

“Passwords are hashed (one-way encryption)”

Technically,

Passwords are hashed on the server side. They are not encrypted before being sent.


36 posted on 05/03/2025 12:47:37 PM PDT by TexasGator (11.1'11.'11/'~~'111./.)
[ Post Reply | Private Reply | To 22 | View Replies]

To: TexasGator
Passwords are hashed on the server side. They are not encrypted before being sent.

Any secure site uses https:// (extension of the HTTP communications protocol to support TLS encryption), so the entire transmission is encrypted.

You should never enter anything sensitive on any site that doesn't use it.

37 posted on 05/03/2025 12:50:39 PM PDT by E. Pluribus Unum (Democrats are the Party of anger, hate and violence.)
[ Post Reply | Private Reply | To 36 | View Replies]

To: Adder
"they’ll be prompted to sign in with the passkey – not a password. And the difference is???"

A picture is worth a thousand words...

38 posted on 05/03/2025 12:57:27 PM PDT by Openurmind
[ Post Reply | Private Reply | To 33 | View Replies]

To: E. Pluribus Unum

Have you checked out the “Gemini” Protocol? Pretty cool use of TLS Certs for secure end to end connections like is common. But it does it through the wild net and is truly tunneled end to end or it will not even make a connection to the personal servers.


39 posted on 05/03/2025 1:08:43 PM PDT by Openurmind
[ Post Reply | Private Reply | To 37 | View Replies]

To: Openurmind

Your last sentence betrays your ire. This isn’t about Microsoft it’s about Windows and software licensing, I’m on board with you on the subscription service crap.

As far as identity goes, which has been my field for 30 years, passwordless is the future and it’s about damn time we’re here. We’ve been fighting passwords since at least 2008, if not earlier, because they’re ALWAYS the first vector of attack for threat actors.

Microsoft isn’t the only entity doing this. Passkeys are available across a lot of financial institutions, government agencies, education establishments, and industrial areas. They are helping to secure environments against the most prevalent threat to any entity: garbage passwords and lazy users.


40 posted on 05/03/2025 1:10:01 PM PDT by rarestia (“A nation which can prefer disgrace to danger is prepared for a master, and deserves one.” -Hamilton)
[ Post Reply | Private Reply | To 34 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-64 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson