Magic/tragic email links: don't make them the only option

Overall sentiment

  • Strongly mixed but skewed negative.
  • Many find email magic links frustrating or unsafe as the only login method, especially compared to passwords + managers or passkeys.
  • Some defend them as simpler for non-technical or infrequent users and useful in specific contexts.

Usability and UX of magic links

  • Multi‑device pain: email often isn’t available on work laptops, gaming PCs, TVs, or shared/corporate devices; users end up forwarding links, copying long URLs, or creating QR codes.
  • Slower and fragile: SMTP delays, spam filters, graylisting, corporate firewalls, and .zip TLD blocking frequently interrupt flows.
  • Distraction: being forced into an inbox breaks task flow and leads to users getting “lost” in email.
  • In‑app browsers: email/RSS/Slack clients open links in embedded WebViews or wrong browsers, stranding the session.
  • Frequent re‑logins plus magic links (e.g., some AI tools, banking apps) push users to abandon products.

Security considerations

  • Email as single factor: if email is compromised, accounts are too; many point out this is already true for password resets.
  • Phishing risk: training users to click login links in email normalizes behavior phishers exploit; QR login has similar abuses.
  • Anti‑phishing scanners and link previewers auto‑click links, consuming one‑time tokens or auto‑confirming actions.
  • GET‑based logins violate the “GET must not change state” norm and interact badly with prefetchers and security tooling.
  • Some implementations log in the requesting device when the link is clicked elsewhere, which can be a “phisher’s dream.”

Alternatives and mitigations

  • Email/SMS OTP codes are widely seen as a better middle ground: work cross‑device, avoid link auto‑clicks, but remain phishable.
  • Recommended mitigations:
    • Link → landing page → explicit “Confirm login” POST.
    • Couple link to a browser cookie or IP; if mismatch, require extra confirmation or OTP.
    • Include device, location, and browser info on confirmation screens.
    • Provide backup codes or allow passkeys/passwords alongside magic links.
  • Some advocate QR‑based cross‑device flows, but note they are heavily phished in practice.

Passkeys and other auth methods

  • Passkeys praised for strong security and quick UX on existing devices; suggested as primary, with email OTP/magic links as recovery.
  • Concerns:
    • Recovery and vendor lock‑in (loss of device, platform bans, sync failures).
    • Poor fit for untrusted or shared devices where users don’t want their whole passkey store.
    • Legal issues around biometrics vs passwords in some jurisdictions.
  • Many still prefer traditional username/password + password manager + TOTP for control, speed, and predictable cross‑device use.

When magic links are seen as acceptable

  • Low‑risk, infrequently accessed tools, simple enterprise utilities, guest checkouts, unsubscribe links, and “grandma‑friendly” apps.
  • Several argue they can be “good” in such niches, but “not the best,” and should rarely be the only option.