The faster we can escape from using passwords the better
The Fido Passkey solution is essentially a public / private key solution where a website / server will not hold your password but a public key instead. This means if the website / server is hacked your password cannot be stolen as there is no password. Only the public key which is worthless without the private key.
Your private keys reside on a security chip (Apple Secure Enclave inside the Apple Silicon SoC). You can write private keys to the Secure Enclave but not retrieve them. You can reset the Secure Enclave tossing all the private keys except the factory burned in private key. When you authenticate using a passkey, you receive the public key and it is sent to the Secure Enclave on your device. If it matches a private key within, then the chip answers YES if not NO. If YES, you are authenticated. Using a smartphone this can be done with a QR code embedded with the public key. If you are using a PC, smart TV for example. On the smartphone itself, the QR is not necessary it will just send the public key and iOS sends it to the Secure Enclave. Apple Silicon Macs as well.
The only problem with the Fido Passkey solution is the implementation of it on every website. I’ve run across several that were not as well put together as others. Sure it’s secure, but it’s maddeningly frustrating to use for most people. Others are smooth and simple. So it depends on the developers. In many cases it feels like an after-thought and zero time was spent on actual UX (User Experience) design. Someone on-high said, we need to add passkeys immediately. Dev’s just plug it into the system with little thought to the user experience.
Another option is a Yubikey USB-A / USB-C / NFC which is where you keep the private keys. This will work for any device that lacks a TPM / Secure Enclave chip. It’s more secure than TPM and on-par with the Secure Enclave. It’s recommended that you have multiple duplicate keys in the event you lose one or it’s stolen.