Microsoft Confirms Password Deletion for 1B Users

Scope and framing of Microsoft’s move

  • Many see the Forbes headline as overstated; Microsoft talks about millions of password deletions and a roadmap, not confirmed removal for 1B users yet.
  • Some view this as security progress; others see it as Microsoft papering over its own security failures and pushing lock‑in.

Recovery, lockout risk, and backups

  • Biggest anxiety: “lost phone / stolen device / house fire / travel with no device” ⇒ permanent account loss.
  • Current reality: recovery typically falls back to email, SMS, backup codes, or support flows, which reintroduce password‑like or KBA risks.
  • People complain there’s no simple, user‑controlled backup/export; draft “credential exchange” specs exist but are immature and often cloud‑mediated.
  • Power users want printable, offline, cross‑vendor backups; others argue unexportability is a security feature.

Device, vendor lock‑in, and cloud trust

  • Strong concern that mainstream passkey implementations are tied to Apple/Google/Microsoft clouds and specific OS ecosystems.
  • Cross‑platform support via password managers (Bitwarden, 1Password, KeePassXC, Proton Pass, etc.) is praised but seen as poorly communicated and sometimes discouraged by attestation policies.
  • Some explicitly reject any scheme where a cloud vendor can ban or misidentify them and thereby cut off all access.

Security improvements vs passwords

  • Pro‑passkey arguments:
    • Public‑key challenge–response; private key never leaves device.
    • Domain binding prevents credential reuse on phishing sites.
    • Eliminates password stuffing and most server‑side password leak impact.
    • Forces uniqueness and sufficient entropy, especially for non–password‑manager users.
  • Skeptics note that password managers with strong, unique passwords and autofill already mitigate many of these issues for power users.

Usability, UX, and non‑technical users

  • Some report excellent UX (two taps with Face/Touch ID; “feels magic”), and higher success than passwords.
  • Others recount broken or confusing flows, especially: multi‑device setups, Windows Hello quirks, browser differences, and QR‑code “hybrid” sign‑ins.
  • Serious worry about elderly or low‑income users: single phone, no backups, weak mental model; current messaging and tooling are seen as too complex.

Hardware tokens and alternatives

  • YubiKeys and similar “roaming authenticators” are liked for security but criticized as expensive, easy to lose, and awkward to manage across many services.
  • Some prefer passkeys stored in password managers over platform clouds; others stick with TOTP or even PAKE‑based password systems.

Ethics, coercion, and policy

  • Many resent “dark pattern” prompts that won’t accept a permanent “no.”
  • FIDO attestation and potential whitelisting are viewed by some as a future tool for excluding “undesirable” devices/providers and tightening platform control.