DEV Community

vdelitz
vdelitz

Posted on • Originally published at corbado.com

Why Hardware-Bound Passkeys Still Struggle

Why Hardware-Bound Passkeys Still Struggle

Hardware-bound passkeys offer AAL3 assurance, but synced passkeys dominate consumer adoption. Here’s why distribution and UX matter more.

Hardware-bound passkeys have a market problem, not a crypto problem

Hardware-bound passkeys are the strongest consumer passkey model on paper. The private key stays inside a physical secure element, which is why they can reach NIST AAL3, while synced passkeys are capped at AAL2.

But consumer adoption tells a different story.

The FIDO Alliance Authentication Barometer 2024 shows that hardware-bound passkey activation in consumer banking is still below 5 percent in 2025. That is the core tension: the highest-assurance option exists, standards are mature, and yet almost nobody uses it at scale in consumer apps.

The reason is not weak hardware. It is distribution and default UX.

Apple and Google control over 99 percent of mobile share, and they decide which passkey option users see first. Synced passkeys get the prime placement through iCloud Keychain and Google Password Manager. A hardware authenticator usually sits one to three clicks deeper. Once that prompt hierarchy is set, even strong FIDO2 security keys or FIDO2 smart cards start the race from behind.

The real split: storage policy changes the whole deployment model

At the protocol level, synced and hardware-bound credentials are both WebAuthn credentials. The difference is where the private key lives and whether it can be recovered from the cloud.

Type Key storage Recovery Assurance
Synced passkeys Cloud-synced manager like iCloud Keychain or Google Password Manager Easy across devices AAL2
Hardware-bound passkeys Physical secure element on a security key, smart card, or TPM Harder, often manual AAL3

That storage-policy difference drives everything downstream:

  • Regulatory fit: hardware-bound credentials align better with stricter possession-factor requirements such as PSD2 and PSD3 interpretations.

  • Recovery burden: synced passkeys recover smoothly, while hardware loss can push users into risky fallback flows.

  • Consumer behavior: most users choose the default option that appears in the autofill flow.

This is why WebAuthn Conditional UI matters so much. It favors the credential manager already integrated into the platform. Hardware is technically supported, but rarely promoted.

Security keys and smart cards face different bottlenecks

The consumer race is mostly a contest between two hardware forms:

  • FIDO2 security keys, usually sold directly to users

  • FIDO2 smart cards, often distributed by banks or issuers

Each has a clear weakness.

Security keys are expensive for broad consumer rollout. A typical device costs 40 to 80 USD, which works in enterprise settings but not for mainstream consumer login.

Smart cards solve distribution better because banks already issue physical cards. They can also fit regulated journeys like transaction confirmation and account recovery. But they depend heavily on NFC passkey authentication, and that is where deployment gets messy. Android NFC behavior varies across manufacturers, and a tap flow that works on one device may fail on another.

So the market is not blocked by cryptography. It is blocked by prompt design, NFC fragmentation, recovery design, and support economics.

The winner will combine hardware with observability and routing

This is why passkey adoption engineering matters more than many teams expect.

A hardware vendor can ship excellent silicon and still lose if it cannot answer basic deployment questions:

  • Did the user ever see the hardware option?
  • Did they abandon at the NFC tap?
  • Did the browser suppress the preferred path?
  • Did the relying party trigger unnecessary recovery?
  • That is an observability problem.

The article’s strongest takeaway is simple: hardware alone will not win consumer authentication. The winner will pair hardware with passkey observability, device-aware routing, and continuous iteration across broken browser and OS combinations.

In other words, the best product is not necessarily the strongest authenticator. It is the one that can get users through the full ceremony reliably.

Banks have a real opening here because they already control card distribution and operate under stronger regulatory pressure. Hardware vendors also have a path, but only if they move beyond device sales into software, onboarding, recovery, and measurement.

If you are evaluating device-bound passkeys for consumer use, the practical question is no longer “Is the hardware secure enough?” It is “Can we make this usable, measurable, and recoverable at scale?”

Find out more in the full breakdown

Top comments (0)