Loading

Use code OZNET10 for 10% off Scans + Tech



Passkeys, Hardware Keys, and FIDO2: What’s Actually Different

This article clears up the confusion between passkeys, hardware security keys, FIDO2, and certified authentication devices.

Most People Are Comparing The Wrong Things

Passkeys and hardware security keys are often discussed like they are the same product.

They are not.

A hardware security key is a physical device you carry. A passkey is a login credential. FIDO2 is the modern standards framework that allows both to work securely across websites, apps, browsers, operating systems, and devices. FIDO says FIDO2 is made up of WebAuthn and CTAP, and it supports passwordless, second-factor, and multi-factor authentication using built-in or external authenticators like phones and security keys.

That difference matters because buying the wrong device, misunderstanding passkeys, or trusting weak fallback methods can leave your accounts less protected than you think.

A hardware key is the tool. A passkey is the credential. FIDO2 is the standard family that makes modern passwordless login work.

The Simple Answer

No, hardware keys and passkeys are not the same.

But they overlap.

A modern FIDO2 hardware security key can store and use a device-bound passkey. A phone, laptop, or password manager can also store and sync passkeys. That is where the confusion starts. FIDO says passkeys can be securely synced across devices or bound to a specific device, including computers, phones, and security keys.

So the real comparison is not simply:

hardware key vs passkey

The better comparison is:

synced passkey vs device-bound passkey vs hardware security key

That is the clean way to understand it.

What A Hardware Security Key Actually Is

A hardware security key is a physical authenticator.

It usually looks like a small USB device, NFC token, smart card, or wearable. You plug it in, tap it, or connect it wirelessly to prove that you are the person trying to sign in.

Common connection methods include:

  • USB-A
  • USB-C
  • NFC
  • Bluetooth Low Energy
  • Lightning on some older devices

A hardware key can be used as a second factor with a password, or it can support passwordless login when it supports modern FIDO2 features. FIDO’s CTAP2 standard allows external authenticators such as FIDO security keys and mobile devices to work with FIDO2-enabled browsers and operating systems over USB, NFC, or Bluetooth for passwordless, second-factor, or multi-factor login.

The biggest security advantage is separation.

Your phone can be stolen. Your laptop can be infected. Your cloud account can be targeted. A separate hardware key gives your most important accounts a stronger physical barrier.

What A Passkey Actually Is

A passkey is not a gadget.

A passkey is a cryptographic login credential used to sign in without typing a password. FIDO defines a passkey as a FIDO authentication credential tied to a user’s account on a website or app, unlocked the same way the user unlocks their device, such as with biometrics, a PIN, or a pattern.

Instead of a password that can be guessed, reused, leaked, or phished, passkeys use public-key cryptography. FIDO says passkeys replace passwords with cryptographic key pairs and are designed for phishing-resistant sign-in.

In plain English:

  • The website keeps a public key.
  • Your device keeps the private key.
  • You unlock your device to approve the login.
  • The private key does not get typed into a fake website.
  • There is no reusable password for attackers to steal.

That is why passkeys are a major upgrade from passwords and SMS codes.

The Key Difference: Authenticator vs Credential

This is the part most people miss.

TermWhat It MeansPlain-English Version
Hardware security keyA physical authenticatorThe thing you carry
PasskeyA cryptographic credentialThe login secret
FIDO2Standards frameworkThe system behind modern passwordless login
WebAuthnBrowser and web API standardLets websites use passkeys
CTAPDevice communication protocolLets devices talk to browsers securely
U2F / CTAP1Older FIDO second-factor methodUsually password + key
Synced passkeyPasskey copied across trusted devicesConvenient
Device-bound passkeyPasskey that stays on one device or keyHigher control

A hardware security key can hold a passkey. A phone can hold a passkey. A laptop can hold a passkey. A password manager can hold a passkey.

The passkey is the credential.

The authenticator is where it lives and how it gets used.

Synced Passkeys Are Built For Convenience

Synced passkeys are the version most normal users will encounter first.

They can sync through services such as iCloud Keychain, Google Password Manager, Microsoft accounts, or third-party password managers. Apple says passkeys sync across a user’s devices using iCloud Keychain, with end-to-end encryption and strong cryptographic keys not known to Apple.

That makes synced passkeys practical.

You create a passkey on one device, then use it across your other trusted devices. You are not forced to register every device manually for every account.

This is excellent for:

  • Email
  • Shopping accounts
  • Social media
  • Everyday banking
  • Personal productivity apps
  • Normal consumer accounts

The trade-off is control.

Synced passkeys are convenient because they can move between devices. That also means your passkey provider, recovery process, device security, and cloud account protection matter.

Device-Bound Passkeys Are Built For Control

A device-bound passkey stays on one device or one hardware key.

It does not sync across all your devices. That makes it less convenient, but stronger for accounts where you want fewer copies of the credential in existence.

FIDO says passkeys that never leave a single device are generally called device-bound passkeys, while passkeys synced between devices through a cloud service are generally called synced passkeys.

Device-bound passkeys are better for:

  • Crypto exchange accounts
  • Hardware wallet-related accounts
  • Admin panels
  • Business systems
  • Developer accounts
  • Health records
  • Legal, financial, or high-value accounts
  • High-risk users such as journalists, executives, activists, and public figures

They are not as smooth. But they reduce exposure.

Yes, A Hardware Key Can Store A Passkey

This is where the “hardware key vs passkey” debate gets messy.

A FIDO2 hardware security key can store a passkey. FIDO says security keys can house device-bound passkeys and have done so since FIDO2 added passwordless support through discoverable credentials with user verification.

Google also tells users they can create a passkey on a hardware security key, but the key must support the FIDO2 protocol.

So the blunt answer is:

A hardware security key is not the same thing as a passkey, but a modern FIDO2 hardware key can store and use a passkey.

That is the distinction.

FIDO2 Is Not A Brand Name

FIDO2 is not a company, product, or marketing label.

It is a standards framework built around two major parts:

StandardWhat It Does
WebAuthnLets websites and apps use public-key authentication
CTAPLets external authenticators like security keys talk to devices and browsers

FIDO says WebAuthn defines the standard web API for FIDO authentication, while CTAP2 allows external authenticators like FIDO security keys and mobile devices to work with FIDO2-enabled browsers and operating systems.

That is why FIDO2 matters.

It makes passwordless login possible across major platforms instead of locking users into one company’s closed system.

FIDO2 vs U2F: Do Not Mix Them Up

Older security keys often supported FIDO U2F, now known as CTAP1.

That older model was mainly built for second-factor login. You still typed your password, then used the security key as the extra proof.

Modern FIDO2 / CTAP2 can support passwordless login, second-factor login, and multi-factor login. FIDO says CTAP1 allows existing U2F devices to work for a second-factor experience, while CTAP2 supports passwordless, second-factor, and multi-factor authentication.

That means not every “security key” gives you the same experience.

Some keys are basic second-factor tools. Others support modern passwordless authentication and discoverable credentials.

FIDO-Certified vs Non-Certified Hardware Keys

FIDO-certified does not simply mean “good.”

It means the authenticator went through FIDO’s certification process and met the relevant requirements.

FIDO says hardware authenticators such as security keys, cards, and wearables must conform to FIDO2 or U2F specifications and must be certified to at least Authenticator Certification Level 1. Software authenticators can also be FIDO-certified and can be certified to higher security levels.

That matters because certification gives you assurance.

A non-certified key might still work. It might even support some FIDO2 features. But you have less proof that it was tested against FIDO requirements.

For serious accounts, that is not a small detail.

Certification Levels Matter

FIDO certification levels are not all equal.

FIDO says authenticators must be certified to at least Level 1 for UAF, U2F, and FIDO2 certification, and that the levels build on each other, with Level 2 including Level 1 requirements plus extra Level 2 requirements.

FIDO says Level 2 evaluates protection against basic, scalable attacks and requires evaluation by a FIDO-accredited security laboratory.

Here is the practical version:

Certification TypeWhat It Means For You
No clear certificationLess assurance
FIDO Certified Level 1Meets baseline FIDO authenticator certification
FIDO Certified Level 2Stronger evaluation against scalable attacks
Higher levelsBetter fit for higher-risk environments

For normal users, a reputable FIDO2-certified key is usually enough.

For banking, enterprise access, admin accounts, crypto, or government-style risk, higher assurance matters more.

Quick Comparison: Hardware Keys, Synced Passkeys, And Older Keys

FeatureFIDO2 Hardware Security KeySynced PasskeyOlder U2F / Basic Security Key
What it isPhysical authenticatorDigital credentialPhysical second-factor authenticator
Main usePasswordless, MFA, high-risk accountsPasswordless everyday loginPassword + second factor
Where credential livesOn the keyPhone, laptop, cloud-backed provider, or password managerUsually limited second-factor use
Syncs across devicesUsually noYesNo
ConvenienceMediumHighMedium
ControlHighMediumMedium
Phishing resistanceStrongStrongStrong as second factor
Passwordless supportYes, if FIDO2 capableYesUsually no
Best forHigh-value accountsEveryday accountsBasic account hardening

Passkeys Beat Passwords, But They Are Not Magic

Passkeys are a serious upgrade.

They reduce phishing risk, remove password reuse, and make stolen password databases less useful. FIDO says passkeys are phishing-resistant by design and help reduce attacks such as phishing, credential stuffing, and other remote attacks because there are no passwords to steal.

But passkeys do not fix everything.

You still need to care about:

  • Device security
  • Account recovery
  • Weak backup methods
  • Shared computers
  • Lost phones
  • Stolen laptops
  • Malware
  • Cloud account compromise
  • Poorly managed fallback passwords

Google gives a blunt warning: only create passkeys on devices you personally own and use, because anyone who can unlock that device may be able to access the account.

That warning matters.

A passkey on a shared device is not smart security. It is a shortcut to trouble.

The Big Trade-Off: Convenience vs Maximum Assurance

Synced passkeys are excellent for mass adoption.

They are easier than passwords. They are harder to phish. They remove the need to remember long strings of characters. They work well for regular people who just want safer logins without carrying extra hardware.

But synced passkeys are not the same as the highest-assurance, hardware-bound model.

NIST’s SP 800-63-4 guidance integrates syncable authenticators such as synced passkeys, but it also says syncing authentication keys means the key can be exported, and that syncing violates AAL3 non-exportability requirements.

That does not make synced passkeys bad.

It means they are not always the right answer for the highest-risk use cases.

For most people, synced passkeys are a massive upgrade from passwords and SMS codes. For high-risk users and critical accounts, device-bound passkeys on FIDO2 security keys can make more sense.

What Governments And Security Agencies Are Saying

The direction is clear: the industry is moving away from passwords.

The UK National Cyber Security Centre recommends using passkeys over passwords wherever they are available and says passkeys are a more secure alternative that users do not need to remember.

Australia’s Cyber Security Centre says users can buy a FIDO2 security key for increased protection of passkeys, especially for important online accounts, and recommends storing a backup passkey on a second FIDO2 security key in case the first is lost, stolen, or damaged.

That is the smart middle ground.

Use passkeys where available. Use hardware keys for the accounts that matter most. Keep backups.

Which One Should You Use?

The right answer depends on your risk.

SituationBest Choice
Normal everyday accountsSynced passkeys
Email accountPasskey + backup security key
Banking accountPasskey or FIDO2 hardware key if supported
Crypto exchange accountFIDO2 hardware security key
Password manager accountFIDO2 hardware security key + backup key
Business admin accountDevice-bound passkey or hardware key
Developer accountHardware key where supported
Shared family computerAvoid creating passkeys on that device
High-risk public profileHardware keys, backup keys, and strong recovery controls

For most users, the best setup is simple:

  • Use synced passkeys for normal accounts.
  • Use FIDO2 hardware keys for critical accounts.
  • Keep at least one backup hardware key.
  • Remove passkeys from lost, sold, or shared devices.
  • Do not leave passwords as the weak fallback if the service lets you disable or strengthen them.

Common Myths That Need To Die

Myth 1: “A passkey is just a digital password.”

No.

A password is a shared secret you type. A passkey uses cryptographic key pairs and is designed to avoid reusable secrets. FIDO says passkeys replace passwords with cryptographic key pairs for phishing-resistant sign-in security.

Myth 2: “A hardware key and a passkey are the same thing.”

No.

A hardware key is an authenticator. A passkey is a credential. The hardware key may store the passkey, but that does not make them the same thing.

Myth 3: “All hardware security keys support passwordless login.”

No.

Older U2F / CTAP1 keys are mainly for second-factor login. FIDO2 / CTAP2 keys can support passwordless, second-factor, and multi-factor authentication.

Myth 4: “Synced passkeys are unsafe.”

Too simplistic.

Synced passkeys are a major improvement over passwords for most users. The real issue is assurance level. For high-risk accounts, device-bound credentials and hardware keys may be the stronger choice.

Myth 5: “Biometrics are sent to the website.”

No.

FIDO says biometric information stays on the device and is not sent to the remote server. The server only receives assurance that the local check succeeded.

The Best Setup For Most People

Most people do not need to pick only one.

The best approach is layered:

  1. Use passkeys for everyday accounts.
    They are easier and safer than passwords.
  2. Use a FIDO2 hardware key for critical accounts.
    Email, banking, crypto, password managers, and admin accounts deserve stronger protection.
  3. Buy two hardware keys, not one.
    One primary. One backup. Store the backup somewhere safe.
  4. Avoid passkeys on shared devices.
    If someone else can unlock the device, they may be able to use the passkey.
  5. Fix your recovery methods.
    Weak email recovery, SMS fallback, and reused passwords can undermine strong authentication.
  6. Check whether the service still allows password fallback.
    A passkey is less powerful if attackers can still bypass it through a weak old password.

Final Takeaway

Passkeys and hardware security keys are both part of the move away from passwords, but they are not the same thing.

A passkey is the login credential. A hardware security key is a physical authenticator. FIDO2 is the standards framework that makes modern phishing-resistant login work across platforms.

Synced passkeys are the best upgrade for everyday users because they are fast, simple, and much harder to phish than passwords.

FIDO2 hardware security keys are the better choice for high-value accounts because they keep credentials physically separated and can store device-bound passkeys.

Do not overcomplicate it.

Use passkeys where available. Use hardware keys where the account is too important to lose. Keep backups. Avoid shared devices. Stop treating passwords like they are still good enough.