{"id":116394,"date":"2024-07-03T11:07:21","date_gmt":"2024-07-03T11:07:21","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/passkeys-vs-passwords\/"},"modified":"2024-08-19T13:14:41","modified_gmt":"2024-08-19T13:14:41","slug":"passkeys-vs-passwords","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/passkeys-vs-passwords\/","title":{"rendered":"Passkeys vs Passwords: What&#8217;s the Difference?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n\n<p>In\u2063 the ever-evolving world of online security, the words \u201cpasskeys\u201d and \u201cpasswords\u201d are often \u200bused interchangeably. However, there \u200dare some key differences between the two that every internet\u200c user\u2064 should be\u2063 aware of. In this article, we will explore the battle \u2064of passkeys vs passwords and uncover their unique features\u2063 and functions. So, grab your \u2063magnifying glass and let\u2019s take a \u2063closer\u2062 look at these\u200b two important tools in\u200b the fight \u2063against \u2064cybercrime.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>While both passkeys and passwords\u200b serve as a \u2062means of access to your digital accounts, they \u200chave distinct methods \u2062of authentication.\u2062 \u201cPasskeys\u201d refer \u2062to a short sequence of letters, numbers, or \u2064symbols\u200c used as a key to open\u200b a lock. On the other hand,\u200b \u201cpasswords\u201d are \u200ctypically longer and more complex combinations of characters that \u2062grant access to a device or account. Let\u2019s dive deeper \u200binto the\u200d similarities and differences of these \u2063two security measures for a better understanding and to keep all your online accounts and passwords secure , there is no better option than LogMeOnce Password Manager.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/passkeys-vs-passwords\/#1_Unlocking_%E2%81%A3the_Truth_%E2%81%A2Discovering_the_Differences_Between_Passkeys_and%E2%81%A4_Passwords\" >1. Unlocking \u2063the Truth: \u2062Discovering the Differences Between Passkeys and\u2064 Passwords<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/passkeys-vs-passwords\/#2_Simplifying_Cyber_Security_Passkeys_vs_Passwords\" >2. Simplifying Cyber Security: Passkeys vs Passwords<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/passkeys-vs-passwords\/#3_Choosing_the_Right_Key_The_Pros_and_Cons_of_Passkeys_and_Passwords\" >3. Choosing the Right Key: The Pros and Cons of Passkeys and Passwords<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/passkeys-vs-passwords\/#4_Breaking_Down_Encryption_Understanding_the_Functionality_of_Passkeys_%E2%81%A2and_Passwords\" >4. Breaking Down Encryption: Understanding the Functionality of Passkeys \u2062and Passwords<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/passkeys-vs-passwords\/#5_Unlocked_for_You_A_%E2%81%A3Beginners_Guide_to_Passkeys_and_Passwords\" >5. Unlocked for You: A \u2063Beginner\u2019s Guide to Passkeys and Passwords<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/passkeys-vs-passwords\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/passkeys-vs-passwords\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\" id=\"1-unlocking-the-truth-discovering-the-differences-between-passkeys-and-passwords\"><span class=\"ez-toc-section\" id=\"1_Unlocking_%E2%81%A3the_Truth_%E2%81%A2Discovering_the_Differences_Between_Passkeys_and%E2%81%A4_Passwords\"><\/span>1. Unlocking \u2063the Truth: \u2062Discovering the Differences Between Passkeys and\u2064 Passwords<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Unlocking something\u2063 can be exciting and satisfying, whether it\u2019s a \u200dphysical object or a \u200bdigital device. However, the \u2063difference between\u200b using\u200c a passkey or a password to\u2062 unlock something may not be something we often think about. While both of these \u200bmethods serve the same purpose of granting \u2064access, there are significant differences \u2062between the \u2064two that\u200c are worth\u200d exploring.<\/p>\n\n\n\n<p>First, let\u2019s \u200bdefine what a passkey and a password\u2063 actually are. A passkey is a physical object, typically a small key, that is used to unlock something. On the other hand, a\u2062 password is a\u2063 series of characters, such as \u2064letters, numbers, and symbols, that\u2062 must\u200b be\u200d entered correctly to gain access. Now, \u2064let\u2019s dive\u2064 into the key differences between the two.\u2063<\/p>\n\n\n\n<p><strong>Passkey:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Is a physical object\u2063 that can \u2062be carried around<\/li>\n\n\n\n<li>Is usually used\u2063 for lock \u2062and key systems<\/li>\n\n\n\n<li>Is \u200ceasy to \u200buse and does not require memorization<\/li>\n\n\n\n<li>Can\u2064 be lost or stolen,\u2063 which can compromise security<\/li>\n<\/ul>\n\n\n\n<p><strong>Password:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Is a digital \u2063code\u2062 that must be entered correctly\u200d to grant access<\/li>\n\n\n\n<li>Is commonly used for\u200b electronic devices and\u2062 online accounts<\/li>\n\n\n\n<li>Requires memorization and must be kept confidential<\/li>\n\n\n\n<li>Can be changed and reset for added security<\/li>\n<\/ul>\n\n\n\n<p>Understanding the differences between passkeys and \u200bpasswords can help us make more informed decisions \u200dwhen it comes\u2064 to securing our belongings and online accounts.\u2062 Whether it\u2019s using a traditional\u200d lock\u200b and key \u2062system or \u200dsetting a strong password, it\u2019s important to choose the right method to protect\u200d our \u200dbelongings and information.\u200d So next time you unlock something,\u200b take a \u2062moment to appreciate the difference between using a passkey or a \u2063password.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"2-simplifying-cyber-security-passkeys-vs-passwords\"><span class=\"ez-toc-section\" id=\"2_Simplifying_Cyber_Security_Passkeys_vs_Passwords\"><\/span>2. Simplifying Cyber Security: Passkeys vs Passwords<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>With the \u2062ever-increasing use of technology in our daily\u2064 lives, the need for secure online accounts has become more important than ever.\u200c One of the key ways to\u200b protect our\u2064 online \u2063information is through \u2062the use of passwords \u2062or passkeys. However, the\u2062 complexity and \u200bmanagement of these security measures can \u200boften \u2064be\u200c overwhelming. In this \u2064post, we will\u200b delve into the differences between passkeys and passwords \u2064and which one may be \u200dthe \u2063simpler choice for your \u2063cyber security needs.<\/p>\n\n\n\n<p>Both passwords and passkeys serve the\u2062 same\u2062 purpose of providing access to our \u2062online accounts, but they have some\u2062 distinct differences. Passwords are typically a\u2063 combination of\u200c letters,\u2062 numbers, and special characters that are \u200dchosen by the user. Passkeys, on the other\u2063 hand, are \u200dgenerated and provided by a third-party authentication service. Let\u2019s take a closer\u2064 look at the\u2063 benefits and drawbacks of\u200d each option.<\/p>\n\n\n\n<p><strong>Benefits of Passkeys:<\/strong><br>\u2013 Generated by a\u200b third-party, making them harder to\u2062 hack<br>\u2013 Not affected by dictionary\u2063 attacks<br>\u2013 Can be used for\u2062 multiple accounts without\u200d repeating the same \u200cpasskey<\/p>\n\n\n\n<p><strong>Drawbacks of Passkeys:<\/strong><br>\u2013 More expensive than passwords<br>\u2013 Can be challenging to remember, making it necessary to keep \u200bthem written down or use\u2063 a password manager<br>\u2013 May\u200d require additional hardware, \u2064such \u2063as \u200da\u2062 USB key, for \u200blogin<br>\u2013 Requires the use \u2062of a \u200ctrusted authentication \u200bservice<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"3-choosing-the-right-key-the-pros-and-cons-of-passkeys-and-passwords\"><span class=\"ez-toc-section\" id=\"3_Choosing_the_Right_Key_The_Pros_and_Cons_of_Passkeys_and_Passwords\"><\/span>3. Choosing the Right Key: The Pros and Cons of Passkeys and Passwords<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>There are\u2063 a variety of security\u200d measures that we \u200ccan use to protect our digital information, but \u200btwo \u200bof the most common methods \u2064are passkeys and passwords. While they serve the same \u2064purpose of keeping our data\u200c safe, each has its \u200bown set of \u2062pros and cons.<\/p>\n\n\n\n<p>Passkeys, also \u200bknown as digital \u200ccertificates, are\u2064 a type\u200c of encryption key\u200b that is \u200cunique to each user. They are often used\u200d for more sensitive information, such \u200cas\u2063 online banking or government \u200dwebsites.\u2064 One of the main advantages of passkeys \u200cis their \u2063high level of \u200csecurity. They are difficult\u200d to hack and cannot be\u200b easily\u2062 guessed like passwords. Additionally, passkeys\u200b are stored on a hardware\u2063 device, such as a USB drive or a smart card, \u2062which makes them less vulnerable to online attacks. However, passkeys can be a \u200bbit more complicated to \u2062use, as they require specialized\u200d software \u2064and equipment, and they can be expensive \u2063to\u200d obtain and \u200bmaintain.<\/p>\n\n\n\n<p>On the other hand, \u2062passwords are the most common form of authentication and require the user to enter\u2064 a combination of \u2062letters, numbers, and symbols. They \u200bare\u200b easy to create\u200d and \u2062can be used on any \u200bdevice or platform. Another advantage of passwords \u200cis that \u200bthey are \u2064cost-effective and \u2063don\u2019t require any additional hardware. \u2063However, they are not as secure \u2062as passkeys and can\u2063 be easily compromised if not \u200bchosen or managed \u200cproperly. \u2064Moreover, managing multiple passwords for different accounts can become overwhelming and increase the \u2064risk of falling victim to\u2064 cybercrime. Ultimately, when \u200dit comes to \u2064choosing the\u2062 right key for your data,\u200d it\u2019s important to consider the level of \u2064security\u200d needed and weigh the\u200d pros and cons of each method.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"4-breaking-down-encryption-understanding-the-functionality-of-passkeys-and-passwords\"><span class=\"ez-toc-section\" id=\"4_Breaking_Down_Encryption_Understanding_the_Functionality_of_Passkeys_%E2%81%A2and_Passwords\"><\/span>4. Breaking Down Encryption: Understanding the Functionality of Passkeys \u2062and Passwords<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>In today\u2019s\u2063 digital age, keeping our sensitive information \u2064and data secure is \u200bof utmost importance. This is where encryption comes in, which is the\u2063 process of \u2063<a title=\"How To Decrypt A Password\" href=\"https:\/\/logmeonce.com\/resources\/how-to-decrypt-a-password\/\">converting plain text<\/a> into \u200ba coded format to \u2062<a href=\"https:\/\/logmeonce.com\/passwordless-mfa\/\">prevent unauthorized access<\/a>. And within\u2064 encryption, two key components play a \u200bcrucial\u2064 role in keeping our data safe -\u200c passkeys and passwords.<\/p>\n\n\n\n<p>Let\u2019s break\u200c down the functionality of\u200b passkeys and passwords and understand how they contribute to \u200bthe overall encryption process. A passkey, also\u2063 known as an encryption key, is\u2064 a randomly generated code that is used to encrypt and decrypt data. It can be a string\u2063 of numbers, letters, or a combination of both, and \u200bis unique to\u2063 each user. This means that even if someone gains access to your\u200b encrypted data, they would need the specific passkey to decrypt it. On the other hand, a password is a string of characters that is known only \u2063to\u2062 the user and serves as a form of authentication. It is \u200cused to verify \u2062the identity of the user before \u200bgranting access to the encrypted data. Together,\u2062 passkeys and\u200d passwords provide a powerful layer of security to \u2063ensure that \u2062only authorized users can access sensitive information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"5-unlocked-for-you-a-beginners-guide-to-passkeys-and-passwords\"><span class=\"ez-toc-section\" id=\"5_Unlocked_for_You_A_%E2%81%A3Beginners_Guide_to_Passkeys_and_Passwords\"><\/span>5. Unlocked for You: A \u2063Beginner\u2019s Guide to Passkeys and Passwords<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Welcome to\u200d the\u2062 world of passkeys\u200c and passwords!\u200c Whether you are a beginner \u200cor just looking\u200b to refresh your knowledge, this guide has\u200d got\u2062 you covered. In today\u2019s\u2064 digital age, it \u2062is \u2063vital to have\u2062 strong and secure passwords \u200dto protect \u200byour personal\u200b information from cyber \u200cattacks.\u200d Follow these simple tips\u2063 to learn all\u2062 about\u2062 passkeys and passwords and keep your\u200b accounts safe and sound.<\/p>\n\n\n\n<p><strong>\u2062Understand\u200d the\u200d Difference:<\/strong> Let\u2019s start with the basics. \u2063Passkeys and passwords both serve the \u200cpurpose \u200bof securing your online accounts,\u2064 but\u200c they have slight \u2063differences. A passkey usually consists of a series of\u2062 numbers \u2063or symbols and \u2062is primarily\u200b used\u200b for physical devices like keycards or locks. On the other hand, passwords are typically made up of a combination of\u2063 letters, numbers, and special \u200dcharacters and are used to access online accounts such as email, social media, or banking. By recognizing the \u2062difference \u200dbetween\u200c the two, you can better understand how to use them\u2062 effectively.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Q: What\u2019s the difference \u2063between\u2063 passkeys and passwords?<\/p>\n\n\n\n<p>A: Passkeys and passwords are both \u2063used to secure our digital\u200b information and accounts, but they differ\u2063 in some key ways. Here\u2019s a \u200csimple \u2062breakdown to help you understand the difference.<\/p>\n\n\n\n<p>Q: What are passkeys?<\/p>\n\n\n\n<p>A: \u200cA passkey is a unique combination of characters, numbers, and\u2063 symbols that is used to access an electronic device or service.\u200b It is often a shorter and simpler version of a password, typically consisting of 4-6 \u2063characters.<\/p>\n\n\n\n<p>Q: What \u200care passwords?<\/p>\n\n\n\n<p>A: Passwords are longer \u200dand more complex\u2064 than passkeys, usually\u200d consisting of 8-12 characters and a mix of uppercase and lowercase letters, numbers, and symbols. They\u2062 are used to protect sensitive \u200cinformation and accounts, such as online banking or social\u2064 media profiles.<\/p>\n\n\n\n<p>Q: Why are passwords more\u200c common than passkeys?<\/p>\n\n\n\n<p>A: In the past, passkeys were more commonly used because they were\u2064 easier for users to remember. However, as \u200dtechnology has advanced and security measures have become\u2063 more\u2064 stringent, passwords have become\u200b the preferred method for securing digital information.<\/p>\n\n\n\n<p>Q: How is the security level different\u2063 between passkeys and passwords?<\/p>\n\n\n\n<p>A: Passkeys offer \u200ca lower level of \u200csecurity compared to passwords. This is because they are typically \u200bshorter and simpler,\u2064 making them easier to guess or hack.\u200d Passwords, on the \u200dother \u200dhand,\u2064 have a much higher level of complexity, making them \u200bmore difficult to crack.<\/p>\n\n\n\n<p>Q: Can passkeys and \u200cpasswords be \u2062interchangeable?<\/p>\n\n\n\n<p>A: Yes, depending \u200bon\u2063 the \u200dsecurity measures \u200cin place, passkeys and passwords can \u200dsometimes be used interchangeably. Some devices or services may allow for \u200cthe\u200c use of either a \u200bpasskey or\u200c password to access it. However,\u2062 it\u200c is always recommended to\u200d use a strong and \u200cunique password for the best security.<\/p>\n\n\n\n<p>Q: Which one should I use \u200dfor \u2063my accounts?<\/p>\n\n\n\n<p>A: It is \u200bgenerally\u2063 recommended to use passwords for any\u2062 accounts that contain sensitive information, \u2062such as financial or personal information. Passkeys can be\u2063 used for\u200b less sensitive accounts, such as Wi-Fi networks or gaming accounts.<\/p>\n\n\n\n<p>Q: Are there any\u2063 alternatives \u2063to passkeys and \u2064passwords?<\/p>\n\n\n\n<p>A: Yes, there are alternative methods of securing\u200d digital information, such as biometric authentication (fingerprint or facial recognition) \u200dor\u2064 two-factor authentication (requiring a code in addition \u2064to a password). However, passkeys \u200band\u200b passwords remain the most commonly used\u200b methods for securing digital information and accounts.<\/p>\n\n\n\n<p>In summary, while both passkeys and passwords serve the purpose of protecting our digital information, \u2063they \u2062differ \u2063in \u2062complexity and level of security.\u200b It is \u2064important to \u200buse strong \u200cand unique passwords for sensitive accounts to ensure the best \u2062protection.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>In \u2064conclusion, it is clear \u200dthat choosing between passkeys and passwords can greatly impact the\u200d security and \u200bconvenience of your online accounts. If \u2063you are looking \u2062to streamline the\u2062 login process and enhance \u200byour digital security, we recommend creating\u200c a <a href=\"https:\/\/logmeonce.com\/passwordless-mfa\/\">FREE LogMeOnce account<\/a> with auto-login and\u200b SSO capabilities. With LogMeOnce.com, you will have peace\u2063 of mind knowing that your online information is protected.\u200c Upgrade\u2062 your account security\u2063 now and join \u200cthe \u200cmillions of satisfied users who have made the switch!<\/p>\n\n\n\n<p>For more information on passkeys vs passwords and to create your free LogMeOnce account, \u200bvisit\u2062 LogMeOnce.com\u200b today. Don\u2019t compromise on your online security \u2064-\u2063 choose\u2063 the best option for your accounts with LogMeOnce. Improve your online experience and \u200dsafeguard your sensitive information with our innovative features. Protect your account and simplify \u200byour online access \u2013 try LogMeOnce today!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>In\u2063 the ever-evolving world of online security, the words \u201cpasskeys\u201d and \u201cpasswords\u201d are often \u200bused interchangeably. However, there \u200dare some key differences between the two that every internet\u200c user\u2064 should be\u2063 aware of. In this article, we will explore the battle \u2064of passkeys vs passwords and uncover their unique features\u2063 and functions. So, grab your [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[89],"tags":[935,1294,7976,33947,996,781],"class_list":["post-116394","post","type-post","status-publish","format-standard","hentry","category-password-manager","tag-cybersecurity","tag-authentication","tag-computer-science","tag-passkeys","tag-passwords","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/116394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=116394"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/116394\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=116394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=116394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=116394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}