This post will examine the cryptography behind passkeys, the guarantees they do or do not give, and interesting cryptographic things you can do with them, such as generating cryptographic keys and storing certificates.| The Trail of Bits Blog
(This post is nearing 8 000 words. If you want to throw it onto an ereader there's an EPUB version too.)| www.imperialviolet.org