30 min read

No Secrets to Steal: How Windows Hello Eliminated the Shared Secret

How Windows Hello replaced passwords with TPM-backed biometrics, survived a decade of attacks, and helped make passwordless the default.

Permalink

Why Passwords Must Die

In 2024, Microsoft observed 7,000 password attacks every second [1] -- more than double the rate from 2023. Picture this: a user types their carefully memorized 16-character password into what looks like a corporate login page. The page is a phishing replica. In under a second, that password -- the one they have been rotating every 90 days for three years -- belongs to someone else.

Microsoft observed 7,000 password attacks per second in 2024. The password Corbato invented as a quick fix in 1961 had become the single greatest attack surface in computing.

The problem is not weak passwords. The problem is passwords themselves. They are shared secrets -- a piece of information that both you and the server know. Anything a server stores can be stolen. Anything you type can be intercepted. Anything you memorize can be phished. These are not implementation bugs. They are design properties.

It was not supposed to be this way. In 1961, Fernando Corbato [@corbato-ctss; @wiki-password] introduced computer passwords at MIT as a quick fix for multi-user mainframes. Users needed separate file spaces on the Compatible Time-Sharing System (CTSS), and a secret string was the simplest way to provide per-user isolation. It was a temporary measure for a specific engineering constraint.

That temporary measure lasted 64 years.

What if authentication did not require a secret at all? What if your face unlocked a cryptographic key -- and that key never left your device? That is the promise of Windows Hello. But the story of how we got here passes through a gelatin finger, a low-cost USB device, and a near-infrared camera that shattered assumptions about what "secure" really means.


The Password's 64-Year Reign: A Brief History of Authentication Failure

In 1966, a software bug in MIT's CTSS printed the master password file to every user's terminal -- the first known password breach [2].

The 1966 CTSS incident was not a hack. A system administrator accidentally swapped the login message file with the master password file. Every user who logged in that day saw everyone else's password on screen.

It was a sign of things to come. For the next six decades, every generation of authentication would solve one problem -- and reveal a deeper one.

Ctrl + scroll to zoom
64 years of authentication evolution, from plaintext passwords to passkeys

Generation 0: Plaintext passwords (1961)

Corbato's CTSS stored passwords in plaintext [2] in a file accessible to administrators. The model was simple: the user enters a string, the system compares it to a stored copy, and access is granted on match. The key assumption -- that only the legitimate user knows the password -- held exactly as long as the system remained uncompromised. Which was about five years.

Generation 1: Hashed passwords (1970s)

The obvious fix: do not store passwords in plaintext. In 1979, Robert Morris and Ken Thompson published the design behind UNIX's crypt() function [3], a one-way hash based on a modified DES algorithm with a 12-bit salt. Even if an attacker stole the hash file, they could not directly read the passwords. They would have to try every possible password and compare hashes -- a brute-force attack.

For a while, that was computationally infeasible. Then Moore's Law caught up. By the late 1990s, EFF's DES Cracker and distributed.net had reduced 56-bit DES keysearch to under 22 hours [4], making DES-based crypt() increasingly untenable against well-funded attackers. Users also chose weak, predictable passwords, and attackers built rainbow tables that mapped common passwords to their hashes instantly.

Windows made this worse. LAN Manager (LM) hashes [5] uppercased every password, limited them to 14 characters, and split them into two 7-byte halves hashed independently.

The LM hash design was spectacularly bad. By splitting a 14-character password into two 7-character halves, it reduced the brute-force search space from 95^14 to 2 x 95^7 -- a reduction of over 10 billion times. An attacker could crack each half separately.

Rainbow tables could crack LM hashes in seconds. Microsoft eventually disabled LM hashing by default in Windows Vista, but the damage to enterprise networks had been done.

Generation 2: Network challenge-response (1990s)

The next insight: stop transmitting passwords over the network. NTLM [5] used a challenge-response protocol -- the server sends a random nonce, the client computes a response using the nonce and the password hash, and the server verifies the response. The password never crosses the wire.

Kerberos [6], adopted in Windows 2000, improved further with mutual authentication, time-limited tickets, and single sign-on. It was elegant protocol engineering.

But the fundamental problem remained: shared secrets. NTLM was vulnerable to pass-the-hash attacks [7] -- an attacker who obtains the password hash can authenticate without ever knowing the password. Kerberos tickets could be stolen (Golden Ticket, Silver Ticket attacks). Both systems still depended on users choosing strong passwords, which they consistently failed to do.

Generation 3: First software biometrics (2000s)

By the early 2000s, fingerprint readers appeared on Windows laptops. The idea was appealing: replace "something you know" with "something you are." No password to remember, no password to steal.

Microsoft introduced the Windows Biometric Framework (WBF) [8] in Windows 7 (2009), standardizing the API and driver interface. Before WBF, each fingerprint reader vendor -- AuthenTec, Validity, UPEK -- shipped proprietary middleware that injected into the Windows logon process. The result was inconsistent security, driver conflicts, and no centralized management.

But WBF solved the wrong problem. It standardized the API while leaving the security model unchanged: biometric templates stored with weak encryption in user-accessible files, matching running in OS user space, and no hardware isolation whatsoever.

In 2002, Tsutomu Matsumoto at Yokohama National University demonstrated the "gummy finger" attack -- creating gelatin replicas of fingerprints that fooled approximately 80% of commercial readers [9]. The materials cost less than $10. Without liveness detection and hardware protection, biometrics were security theater.

The pattern was unmistakable. Each generation protected a different layer -- plaintext storage, hash computation, network transmission, biometric convenience -- but each left the next layer exposed. By 2013, passwords were fundamentally broken, and software-only biometrics were not the answer. Then Apple proved something nobody expected.


The Catalyst: How Touch ID Changed Everything

September 2013. Apple unveils the iPhone 5S [10] with a fingerprint sensor embedded in the home button. It was not the first phone with a fingerprint reader -- Motorola's ATRIX 4G shipped with a biometric fingerprint reader in 2011 [11]. But it was the first one that hundreds of millions of people actually used.

What made Touch ID different was not the sensor. It was the Secure Enclave -- a dedicated secure subsystem integrated into Apple's system-on-chip and isolated from the main processor [12]. The enclave runs its own microkernel, stores biometric material in protected memory, and keeps the matching pipeline outside the reach of normal iOS processes. Apple designed it so the biometric path stayed inside the enclave boundary rather than becoming just another app-visible API.

That architecture established a pattern that Windows Hello would later follow with the TPM. Both isolate secrets in hardware, but they do different jobs: the Secure Enclave is a richer coprocessor that protects both biometric processing and keys, while the TPM is a narrower trust anchor for key storage, signing, and attestation. Apple's newer Secure Enclave documentation also emphasizes encrypted enclave memory, whereas Windows later needed ESS and VBS to give its broader PC ecosystem a comparable isolation boundary [@apple-secure-enclave; @ms-ess].

Touch ID proved two things simultaneously: that consumer biometrics could be both secure and delightful, and that the key to secure biometrics was hardware isolation, not better algorithms.

The FIDO Alliance had already been working on the standards side. Founded in July 2012 [13] by Michael Barrett (PayPal's CISO), Ramesh Kesanupalli (Nok Nok Labs), and partners including Lenovo, Validity Sensors, and Infineon, the Alliance set out to create open standards for strong authentication that would replace passwords. Its first protocols split the problem in two: UAF defined a passwordless flow where a device-local biometric or PIN unlocks a per-service key pair [14], while U2F defined a hardware-token second factor that signs a challenge after the user taps the device [15]. FIDO2 later unified these ideas into the WebAuthn + CTAP stack used for passkeys today [16].

The convergence was forming: consumer demand (Apple proved people wanted biometrics), open standards (FIDO defined how it should work), and enterprise need (Microsoft tracked thousands of password attacks per second). Apple showed what was possible. The FIDO Alliance defined how it should work. Microsoft was about to show how to do it at the scale of an entire operating system.


The Breakthrough: Windows Hello's Architecture

On March 17, 2015, Joe Belfiore announced Windows Hello. The key insight was not an algorithm -- it was an architecture. What if the biometric never leaves the device, and the authentication secret is a cryptographic key that even the server never sees?

Trusted Platform Module (TPM)

A dedicated security chip soldered to a computer's motherboard (or implemented in firmware) that generates, stores, and manages cryptographic keys. The TPM can create key pairs where the private key is physically bound to the chip and cannot be exported -- even the operating system cannot extract it. Windows Hello uses TPM 2.0 to seal authentication keys.

Asymmetric cryptography

A cryptographic system using two mathematically related keys: a public key (shared openly) and a private key (kept secret). Data encrypted with one key can only be decrypted with the other. In Windows Hello, the TPM holds the private key and signs authentication challenges; the server holds only the public key, which is useless to an attacker.

Here is how Windows Hello authentication [17] works:

Ctrl + scroll to zoom
Windows Hello authentication flow -- biometric unlocks TPM, TPM signs challenge, server verifies with public key

Step 1: Enrollment. The TPM generates an asymmetric key pair -- RSA-2048 or ECDSA P-256. The private key is sealed inside the TPM and cannot be exported. The public key is registered with the identity provider (Azure AD, Entra ID, or on-premises AD) [17].

Step 2: Biometric enrollment. The user registers their face (via a near-infrared camera) or fingerprint. The biometric template is stored locally on the device, protected by the OS.

Step 3: Authentication. The user presents their biometric gesture. The device verifies it locally against the stored template. If the match succeeds, the TPM releases the private key. The identity server sends a random challenge nonce; the device signs it with the private key and returns the signed assertion. The server verifies the signature using the stored public key. No shared secret ever crosses the network.

Windows Hello's breakthrough was architectural, not algorithmic. By pairing biometrics with hardware-backed asymmetric cryptography, it eliminated shared secrets entirely. No biometric data ever leaves the device. No password hash sits on a server waiting to be stolen. Each authentication is a fresh, unreplayable cryptographic signature.

False Acceptance Rate (FAR)

The probability that a biometric system incorrectly accepts an unauthorized person. Windows Hello requires a facial recognition FAR below 0.001% (1 in 100,000) [18]. Apple's Face ID is documented at less than 0.0001% (1 in 1,000,000) for a single enrolled face [19]. Lower is better -- but zero is theoretically impossible.

Near-infrared (NIR) imaging

A camera technology that captures light in the 700--1000 nanometer wavelength range, invisible to the human eye. Windows Hello uses NIR cameras because infrared illumination works regardless of ambient lighting and is harder to spoof with printed photos or screens -- standard displays do not emit near-infrared light. Or so everyone assumed until 2025.

The PIN paradox

Windows Hello also revived the humble PIN -- and made it more secure than a complex password. A Hello PIN [17] is device-bound: it unlocks the TPM-stored private key on that specific device. A stolen PIN is useless without physical access to the hardware. Compare this to a password, which works from any device on earth. A 4-digit PIN on Windows Hello is architecturally more secure than a 20-character password reused across services.

Microsoft Passport was briefly announced as a separate product in early 2015 -- the cryptographic key infrastructure behind Windows Hello. By late 2015, the branding was merged. "Microsoft Passport" was retired and its functionality absorbed into "Windows Hello" and "Windows Hello for Business." The separate brand caused market confusion and was quickly abandoned.

The biometric FAR can be expressed mathematically. For a face recognition system with nn enrolled users and a per-comparison FAR of pp, the probability of at least one false acceptance across all comparisons is:

P(false accept)=1(1p)nP(\text{false accept}) = 1 - (1 - p)^n

For Windows Hello's required FAR of 10510^{-5} [18] and a single user, this gives a 0.001% chance per authentication attempt. With 1,000 attempts, the cumulative probability rises to roughly 1% -- which is why lockout policies and anti-hammering protections exist.

JavaScript Simulating Hello's asymmetric challenge-response
// This demonstrates the core idea behind Windows Hello's authentication.
// In the real system, the private key lives in the TPM and never leaves.

async function simulateHelloAuth() {
// Step 1: Enrollment -- generate key pair (TPM does this in hardware)
const keyPair = await crypto.subtle.generateKey(
  { name: "ECDSA", namedCurve: "P-256" },
  true, // extractable for demo only; TPM keys are NOT extractable
  ["sign", "verify"]
);
console.log("Key pair generated (simulating TPM enrollment)");

// Step 2: Server sends a challenge nonce
const challenge = crypto.getRandomValues(new Uint8Array(32));
console.log("Server challenge:", Array.from(challenge.slice(0, 8)).map(b => b.toString(16).padStart(2, '0')).join(''));

// Step 3: Device signs the challenge with the private key
const signature = await crypto.subtle.sign(
  { name: "ECDSA", hash: "SHA-256" },
  keyPair.privateKey,
  challenge
);
console.log("Signed assertion:", new Uint8Array(signature).slice(0, 16).join(',') + '...');

// Step 4: Server verifies with the public key
const valid = await crypto.subtle.verify(
  { name: "ECDSA", hash: "SHA-256" },
  keyPair.publicKey,
  signature,
  challenge
);
console.log("Server verification:", valid ? "SUCCESS" : "FAILED");
console.log("\nNote: The private key never left the device.");
console.log("The server only has the public key -- useless to an attacker.");
}

simulateHelloAuth();

Press Run to execute.

Windows Hello solved the fundamental password problem: no shared secrets ever traverse the network. But the story does not end here -- because researchers would soon discover that protecting the key was not enough if you could not trust the camera.


The Enterprise Gambit: Windows Hello for Business

Windows Hello delighted consumers. But enterprise IT administrators asked a harder question: how do I deploy this to 50,000 machines managed by Active Directory?

WebAuthn

The W3C Web Authentication API -- a browser standard that lets websites request public-key-based authentication from platform authenticators (like Windows Hello) or roaming authenticators (like security keys). WebAuthn became a W3C Recommendation on March 4, 2019, forming the browser-side component of the FIDO2 standard alongside CTAP (Client-to-Authenticator Protocol).

Windows Hello for Business (WHfB) [17] launched in 2016 with two trust types, each carrying its own infrastructure burden:

Certificate Trust required a full Public Key Infrastructure -- a Certificate Authority hierarchy, CRL distribution points, certificate templates, and ADFS (Active Directory Federation Services). For organizations that already had PKI, this was a natural fit. For everyone else, it meant weeks of setup.

Key Trust required Windows Server 2016+ domain controllers with AD schema extensions. Simpler than Certificate Trust, but still demanded on-premises infrastructure that many cloud-first organizations were trying to eliminate.

Yogesh Mehta, Principal Group Program Manager at Microsoft, evangelized Windows Hello for Business at Ignite 2016. He would later be credited as a key figure in the FIDO2 certification effort. The original Belfiore blog post URL announcing Windows Hello is now lost to link rot.

Two milestones accelerated adoption. In March 2019, WebAuthn became a W3C Recommendation [20] -- a universal browser API for public-key authentication. Android had already been FIDO2-certified in February 2019 [21]; two months after WebAuthn's recommendation, Windows Hello became one of the first FIDO2-certified platform authenticators built into a desktop operating system [22]. Together, these meant that Windows Hello could authenticate not just to Windows, but to any FIDO2-supporting website through any modern browser.

Ctrl + scroll to zoom
Decision tree for choosing a Windows Hello for Business trust model

Cloud Trust delegates all validation to Entra ID. No on-premises PKI, no ADFS, no certificate templates. Best for organizations that are cloud-native or hybrid with Azure AD.

Key Trust requires Windows Server 2016+ domain controllers with AD schema extensions. Choose this if you need on-premises AD support but do not have PKI.

Certificate Trust requires the full PKI stack -- CA hierarchy, CRL distribution, ADFS. Choose this only if your organization already has PKI infrastructure and needs certificate-based authentication for regulatory compliance.

Enterprise deployment was painful -- multiple trust models confused administrators, and adoption was slower than hoped. But it was about to get much worse. In July 2021, a researcher with a low-cost USB board would demonstrate that Windows Hello's most basic assumption was wrong.


The Security Arms Race: When Researchers Fought Back

Omer Tsarfati had a simple question: what happens if you plug in a USB device that claims to be an IR camera? The answer would force Microsoft to rethink Windows Hello's entire trust model.

The USB camera bypass (CVE-2021-34466)

In July 2021, Tsarfati at CyberArk Labs [24] revealed that Windows Hello's facial recognition accepted input from any USB device presenting itself as an IR camera -- with no attestation, no hardware trust verification, and no device identity check.

Tsarfati's attack required only a single IR frame -- not video, not a 3D reconstruction, just one static infrared image of the target's face. The simplicity of the attack was what made it so alarming.

Using an NXP evaluation board [25], Tsarfati constructed a custom USB device that replayed a single IR frame of a target's face. Plug it in, and Windows Hello authenticated the attacker as the target. At the time, 85% of Windows 10 users employed Windows Hello [24] -- making this a massive attack surface.

The insight was devastating: the TPM protected the key, but nobody protected the camera. Windows Hello's threat model assumed trusted camera hardware. The USB specification makes no such guarantee.

Virtualization-Based Security (VBS)

A Windows feature that uses the hardware hypervisor to create an isolated virtual environment (Virtual Trust Level 1, or VTL1) separated from the main OS kernel (VTL0). Even if an attacker gains SYSTEM-level access to the Windows kernel, they cannot read memory in VTL1. Windows Hello's Enhanced Sign-in Security uses VBS to isolate biometric processing.

Microsoft's response: ESS and VBS

Microsoft's answer came with Windows 11: Enhanced Sign-in Security (ESS) [26], which moved biometric matching into the VBS-protected enclave described above. Even a compromised Windows kernel cannot access templates or tamper with the comparison pipeline there.

Ctrl + scroll to zoom
VBS/ESS isolation architecture -- biometric processing runs in a hypervisor-protected enclave

Alongside ESS, Microsoft rolled out Cloud Trust in 2022 [23], eliminating the need for on-premises PKI for many deployments. Two problems -- biometric isolation and deployment complexity -- were finally being addressed in parallel.

Red Bleed: the NIR assumption shatters (CVE-2025-26644)

The arms race was not over. In August 2025, researchers Bowen Hu, Kuo Wang, and Chip Hong Chang at Nanyang Technological University presented "Red Bleed" [27] at USENIX Security 2025. Microsoft had already patched CVE-2025-26644 [28] in April 2025, but the full attack was now public.

Windows Hello's NIR facial recognition relied on a critical assumption: no commercial display can emit near-infrared light. The researchers shattered this assumption [29] with a custom-built LCD screen costing less than $400 that could display NIR images. They trained a Variational Autoencoder to convert widely available RGB photos -- from social media, video calls, public sources -- into convincing NIR facial videos. The result: a presentation attack that bypassed Windows Hello face authentication and prompted liveness-detection hardening [30]. The Red Bleed attack name references the "red bleed" phenomenon in LCD panels where a small amount of near-infrared light leaks through the color filters -- the researchers amplified this effect with a custom panel.

Microsoft's April 2025 patch strengthened liveness detection and anti-spoofing measures for NIR authentication.

Faceplant: the template swap (CVE-2026-20804)

The third major attack came from ERNW Research in August 2025. At Black Hat USA 2025, Baptiste David and Tillmann Oßwald's official conference briefing "Windows Hell No for Business" [31] detailed the Faceplant template-injection attack, which they later documented technically on ERNW's research blog [32].

In practice, an attacker with local administrator privileges could enroll their own face on one machine, extract the resulting template, and transplant it into the victim's biometric database on the target device. After injection, Windows Hello accepted the attacker's face for the victim's account. ERNW traced the weakness to software-protected templates that a local administrator could extract and replace on non-ESS systems [32].

ESS blocks this attack completely -- biometric templates in VTL1 are inaccessible even to local administrators. But many enterprise PCs lack ESS-compatible hardware.

Ctrl + scroll to zoom
The security arms race -- each attack revealed a new layer that needed protection

Each generation of authentication protected a new layer -- but every layer revealed the next attack surface. The TPM protected the key. ESS protected the biometric pipeline. Liveness detection hardened NIR authentication. Security is never a single solution. It is a stack, and each layer needs its own defense.

The arms race revealed a humbling truth: biometric authentication is not a silver bullet. It is a layered defense -- and each layer needs its own protection. But while researchers probed Windows Hello's defenses, the industry was converging on something bigger.


The Convergence: Passkeys and the Passwordless Future

May 5, 2022. Apple, Google, and Microsoft [33] -- three companies that agree on almost nothing -- issued a joint announcement: they were all committing to passkeys.

Passkey

A FIDO2/WebAuthn credential built on the same public-key model as Windows Hello. Passkeys can be device-bound (like traditional Hello credentials, stored in the TPM) or synced across devices through a credential manager such as iCloud Keychain or Google Password Manager. The local biometric or PIN check stays on-device; the relying party only sees public keys and signatures.

FIDO2 had a usability problem. Credentials were bound to a single device. Lose your laptop, lose your credentials. Passkeys solved this by introducing synced credentials -- private keys encrypted and distributed across a user's devices through their platform credential manager. The FIDO Alliance's protocol [16] maintained the cryptographic guarantees (no shared secrets, phishing resistance) while adding the portability users demanded.

"World Password Day" was symbolically renamed "World Passkey Day" in May 2025, when Microsoft announced that new accounts would default to passwordless authentication.

The numbers tell the story

By May 2025, Microsoft made new accounts passwordless by default [1]:

  • Nearly 1 million passkey registrations daily [1]
  • 98% passkey sign-in success rate [1] vs. 32% for passwords
  • Passkey sign-ins 8x faster [1] than password + MFA

How the platforms compare

DimensionWindows Hello (WHfB)Apple Face ID / PasskeysGoogle PasskeysFIDO2 Hardware Keys
Hardware root of trustTPM 2.0Secure EnclaveTEE / Titan MOn-key secure element
Credential syncNo (device-bound)Yes (iCloud Keychain)Yes (Google PM)No (hardware-bound)
Cross-platformWindows onlyApple + QR/BT bridgeAndroid/Chrome + QR/BTUniversal USB/NFC/BT
FAR (face)< 0.001%< 0.0001%Varies by OEMN/A
Enterprise managementIntune, GP, Conditional AccessLimited (Apple MDM)Android EnterpriseManual provisioning
Recovery on device lossRe-enroll on new deviceiCloud backup restoreGoogle Account restoreRequires backup key
NIST AAL levelAAL2AAL2AAL2AAL3-eligible
Best suited forWindows enterpriseApple platformAndroid / cross-platform webHigh-assurance regulated

Sources: Microsoft biometric requirements [18], Apple passkey security [34], Google passkeys [35], FIDO specifications [36]

Google's passkey story is centered on Google Password Manager: passkeys created on Android or Chrome sync across Android, ChromeOS, Windows, macOS, Linux, and Chrome browsers where the same account is available [35]. FIDO2 hardware security keys (YubiKey, Google Titan) take the opposite approach: the credential stays on a dedicated secure element, works across platforms via USB/NFC/Bluetooth, and must be provisioned deliberately on each account [@fido-u2f; @fido-how]. That trade-off buys the highest assurance available today; multi-factor cryptographic hardware authenticators are the mainstream route to NIST AAL3 [37].

Ctrl + scroll to zoom
FIDO2 passkey registration flow -- how a new credential is created
JavaScript WebAuthn passkey registration options (browser API)
// This shows the structure of a WebAuthn registration request.
// In production, the challenge comes from your server.

const registrationOptions = {
publicKey: {
  // Random challenge from the server (32 bytes)
  challenge: crypto.getRandomValues(new Uint8Array(32)),

  // Your service identity
  rp: {
    name: "Example Corp",
    id: "example.com"
  },

  // User identity
  user: {
    id: new Uint8Array([1, 2, 3, 4]),
    name: "alice@example.com",
    displayName: "Alice"
  },

  // Acceptable key types (ES256 = ECDSA P-256)
  pubKeyCredParams: [
    { type: "public-key", alg: -7 }  // ES256
  ],

  // Request a resident/discoverable credential (passkey)
  authenticatorSelection: {
    residentKey: "required",
    userVerification: "required"  // Biometric or PIN
  },

  // 5-minute timeout
  timeout: 300000
}
};

console.log("Registration options structure:");
console.log(JSON.stringify(registrationOptions.publicKey.rp, null, 2));
console.log("\nKey algorithm: ES256 (ECDSA P-256)");
console.log("Resident key: required (discoverable passkey)");
console.log("User verification: required (biometric or PIN)");
console.log("\nIn production, call: navigator.credentials.create(registrationOptions)");

Press Run to execute.

Deploying Windows Hello Today

For consumers, the simplest path is built into Windows: open Settings > Accounts > Sign-in options, create a Windows Hello PIN first, then enroll face or fingerprint if the hardware is present [17]. If Windows only offers PIN, the machine lacks a compatible biometric sensor. On a laptop with an IR camera or certified fingerprint reader, enrollment takes a few minutes and the credential becomes device-bound immediately.

For enterprises, Microsoft now recommends starting with Cloud Trust unless certificate-based authentication is a hard requirement. A practical rollout checklist is short: confirm devices are Entra joined or hybrid joined, deploy Microsoft Entra Kerberos, verify Windows 10 21H2+/Windows 11 clients and Windows Server 2016+ read-write domain controllers in each site, then push Use Windows Hello for Business plus Use cloud trust for on-premises authentication through Intune or Group Policy [@ms-cloud-trust-ga; @ms-whfb-deploy]. That is dramatically lighter than standing up PKI, ADFS, and certificate templates.

ESS deserves its own hardware check. A TPM alone is not enough: ESS depends on Windows 11, VBS-capable hardware, and compatible secure biometric sensors [26]. Unsupported systems can still use Hello, but they fall back to the older software-protected biometric path. Hardware inventory determines whether you are getting the modern threat model or merely the old UX.

For password migration, avoid a flag day. Keep passwords as break-glass recovery while you move device sign-in, Microsoft 365, VPN, and high-value internal apps onto Hello or passkeys first [38]. Measure enrollment completion, recovery success, and hardware exceptions. Once those numbers stabilize, tighten Conditional Access so phishing-resistant credentials satisfy MFA and passwords become the fallback of last resort.

After 64 years, the password is finally losing its grip. But the story of Windows Hello is not a triumph -- it is a lesson in the limits of security engineering.


The Limits: What Remains Unsolved

Biometrics fail in a way passwords do not: they are hard to rotate.

You cannot change your face. This single fact defines the deepest unsolved problem in biometric authentication.

Passwords can be rotated. Security keys can be replaced. But you have one face, ten fingerprints, and two irises. If a biometric template is compromised, there is no "reset" button.

Cancelable biometrics

A technique for generating revocable biometric templates by applying non-invertible mathematical transformations to the original biometric data. If a transformed template is compromised, a new transformation can be applied to create a fresh template from the same biometric trait. In theory, this solves the irrevocability problem. In practice, the trade-off between non-invertibility and matching accuracy remains unresolved.

The biometric floor

The theoretical limit on biometric authentication error is the Bayes error rate [39] -- the minimum achievable error when the genuine-user and impostor score distributions overlap. Per information theory, the error probability is bounded by Fano's inequality:

PeH(XY)1logXP_e \geq \frac{H(X|Y) - 1}{\log |X|}

where PeP_e is the probability of error, H(XY)H(X|Y) is the conditional entropy of identity given the biometric sample, and X|X| is the number of possible identities. Current systems achieve a FAR of 10510^{-5} to 10610^{-6}, but the theoretical minimum [39] -- given perfect sensors and optimal classifiers -- could be orders of magnitude lower. The practical gap is driven by sensor noise, environmental variability, and aging of biometric features.

Five open problems

1. Cross-platform credential portability. Passkeys are currently vendor-locked. An Apple passkey does not transfer to a Google account. The FIDO Alliance published draft CXP/CXF specifications [40] in late 2024 for encrypted credential exchange, but full cross-vendor interoperability is not expected before late 2026.

2. The adversarial ML arms race. Generative AI can create increasingly convincing biometric spoofs -- the Red Bleed attack [27] used a VAE to convert RGB photos to NIR facial videos. Discriminative AI tries to detect these spoofs. This is an open-ended arms race with no known endpoint.

3. Account recovery. When all biometric and device-based credentials fail, how does a user recover their account? Most services fall back to email or SMS [38] -- reintroducing the very phishable factors they were designed to eliminate. Recovery codes are functionally passwords.

4. The quantum threat. Shor's algorithm [41] on a sufficiently large quantum computer would break all ECDSA and RSA authentication -- including every FIDO2 credential in existence. NIST finalized post-quantum standards [41] (ML-DSA, SLH-DSA, ML-KEM) in 2024, but no FIDO2 authenticator ships with post-quantum support as of 2026.

5. The ESS hardware gap. ESS requires specific secure sensors and VBS-capable CPUs [26]. Many enterprise PCs -- particularly AMD-based or older Intel machines -- lack the hardware. On these devices, Windows Hello falls back to the pre-ESS security model, leaving them vulnerable to attacks like Faceplant.

6. Accessibility and inclusion. Biometric authentication creates barriers for people with facial differences, missing fingers, or conditions that affect biometric stability. A passwordless future must ensure that non-biometric alternatives (PINs, hardware keys) remain first-class options, not afterthoughts. Behavioral biometrics -- keystroke dynamics, gait analysis, continuous session verification -- represent an emerging parallel path that may expand authentication options beyond traditional biometric modalities.

Check if ESS is active on your device

Open PowerShell as administrator and run:

Get-CimInstance -Namespace root/Microsoft/Windows/DeviceGuard -ClassName Win32_DeviceGuard | Select-Object VirtualizationBasedSecurityStatus

A value of 2 means VBS is running. Then check the biometric service:

Get-WinEvent -LogName Microsoft-Windows-Biometrics/Operational -MaxEvents 10 | Format-List

Look for events indicating ESS-protected biometric operations. If your device lacks ESS, consider disabling biometric sign-in on sensitive accounts and using FIDO2 hardware keys instead.

Biometric traits are permanent and finite. Unlike passwords, they cannot be changed if compromised. This irrevocability is the deepest unsolved challenge in passwordless authentication -- and no amount of better sensors or smarter algorithms can change the fact that you have one face, ten fingerprints, and two irises.

The theoretically ideal system would combine zero-knowledge biometric verification, post-quantum cryptographic authentication, hardware-attested revocable credentials, and cross-platform portability. None of this exists yet.

The password's 64-year reign is ending, but its replacement is still under construction. Every generation of authentication solved one problem and revealed a deeper one. The question is not whether passwordless authentication will win -- it is whether we can build it before the attackers catch up.


Frequently Asked Questions

Frequently asked questions about Windows Hello

Does Microsoft store my face in the cloud?

No. Biometric data never leaves the device. During enrollment, your face or fingerprint template is stored locally, protected by the operating system (and by VBS on ESS-enabled devices). Only a public key is registered with the identity provider (Azure AD / Entra ID) [17]. Microsoft's servers never receive, store, or process your biometric data.

Can a photo fool Windows Hello?

Standard photos cannot. Windows Hello uses near-infrared cameras [18] with anti-spoofing algorithms that distinguish between live faces and flat images. However, researchers have demonstrated advanced attacks: CVE-2021-34466 [24] used a custom USB device emulating an IR camera, and the Red Bleed attack [27] used a custom NIR-emitting LCD display. Both have been patched, but the arms race continues.

Is a PIN less secure than a password?

No -- it is more secure. A Windows Hello PIN is device-bound [17]: it unlocks a TPM-stored private key on that specific hardware. A stolen PIN is useless without physical access to the device. A password, by contrast, works from any device on earth and can be phished, reused, or leaked in a breach.

What is the difference between Windows Hello and Windows Hello for Business?

Consumer Windows Hello [17] ties authentication to a personal Microsoft account. Windows Hello for Business integrates with Azure AD / Entra ID with enterprise management capabilities: conditional access policies, Intune deployment, multiple trust models (cloud, key, certificate), and group policy controls. They share the same biometric and TPM technology but have different management and security models.

Do passkeys replace Windows Hello?

No. Passkeys build on Hello's foundation. Windows Hello acts as the platform authenticator for FIDO2 passkeys [16] on Windows -- your biometric gesture unlocks the passkey stored in the TPM. Passkeys extend Hello's model to cross-platform and cross-service authentication via the WebAuthn standard [42].

What happens if I lose my device?

With device-bound credentials (traditional Windows Hello), you re-enroll on the new device using your Microsoft or organizational account. With synced passkeys, credentials restore from your credential manager -- iCloud Keychain [34] for Apple, Google Password Manager [35] for Android/Chrome. Registering a FIDO2 hardware security key [36] as a backup authenticator is strongly recommended.

Is Windows Hello safe from quantum computers?

Not indefinitely. The asymmetric cryptography underlying Hello and FIDO2 (ECDSA P-256) is theoretically vulnerable [41] to quantum computers running Shor's algorithm. No quantum computer can break it today, and the timeline for cryptographically relevant quantum computers remains uncertain. NIST finalized post-quantum cryptography standards in 2024, but no FIDO2 authenticator ships with post-quantum support yet. Migration planning should begin now.


Study guide

Key terms

TPM
Trusted Platform Module -- hardware chip that generates and stores cryptographic keys
Asymmetric cryptography
Public-key/private-key system where data signed with one key is verified with the other
FAR
False Acceptance Rate -- probability a biometric system accepts an unauthorized person
NIR
Near-infrared imaging -- camera technology used by Windows Hello for anti-spoofing
WebAuthn
W3C standard browser API for public-key-based authentication
VBS
Virtualization-Based Security -- hypervisor isolation for secure processing
ESS
Enhanced Sign-in Security -- VBS-isolated biometric matching in Windows 11
Passkey
FIDO2 credential that can be synced across devices via credential managers
FIDO2
Industry standard for passwordless authentication (WebAuthn + CTAP)
Cancelable biometrics
Revocable biometric templates using non-invertible transformations

References

  1. (2025). Pushing Passkeys Forward: Microsoft's Latest Updates. https://www.microsoft.com/en-us/security/blog/2025/05/01/pushing-passkeys-forward-microsofts-latest-updates-for-simpler-safer-sign-ins/ - Passwordless by default announcement, 7000 attacks/sec, 98% success rate
  2. Fernando J. Corbato, M. Merwin-Daggett, & Robert C. Daley (1962). An Experimental Time-Sharing System. https://dl.acm.org/doi/10.1145/1460833.1460871 - DOI valid; may require institutional access. First computer password system on MIT CTSS
  3. Password - History. https://en.wikipedia.org/wiki/Password#History - Password history including CTSS
  4. crypt (C) - Wikipedia. https://en.wikipedia.org/wiki/Crypt_(C) - UNIX crypt() function
  5. (1999). DES Challenge III Broken in Record 22 Hours. https://w2.eff.org/Privacy/Crypto/Crypto_misc/DESCracker/HTML/19990119_deschallenge3.html - EFF and distributed.net demonstration that 56-bit DES was practical to brute-force
  6. Passwords Technical Overview. https://learn.microsoft.com/en-us/windows-server/security/kerberos/passwords-technical-overview - LM hash weaknesses and NTLM evolution
  7. Kerberos Authentication Overview. https://learn.microsoft.com/en-us/windows-server/security/kerberos/kerberos-authentication-overview - Kerberos ticket-based authentication
  8. Pass the Hash - MITRE ATT&CK T1550.002. https://attack.mitre.org/techniques/T1550/002/ - Pass-the-hash attack technique
  9. Windows Biometric Framework API. https://learn.microsoft.com/en-us/windows/win32/secbiomet/biometric-service-api-portal - Official WBF documentation
  10. (2002). Gummi Bears Defeat Fingerprint Sensors. https://www.theregister.com/2002/05/16/gummi_bears_defeat_fingerprint_sensors/ - Matsumoto gelatin fingerprint attack
  11. (2013). Apple Announces iPhone 5s. https://www.apple.com/newsroom/2013/09/10Apple-Announces-iPhone-5s-The-Most-Forward-Thinking-Smartphone-in-the-World/ - Touch ID introduction with Secure Enclave
  12. (2011). Motorola Mobility and AT&T Announce ATRIX 4G, the Future of Mobile Computing. https://www.prnewswire.com/news-releases/motorola-mobility-and-att-announce-atrix-4g-the-future-of-mobile-computing-112974014.html - Motorola launch release noting the ATRIX 4G biometric fingerprint reader
  13. The Secure Enclave. https://support.apple.com/guide/security/the-secure-enclave-sec59b0b31ff/web - Apple Platform Security description of Secure Enclave isolation and encrypted memory
  14. Enhanced Sign-in Security for Windows Hello. https://learn.microsoft.com/en-us/windows-hardware/design/device-experiences/windows-hello-enhanced-sign-in-security - ESS/VBS isolation architecture
  15. (2013). FIDO Alliance Launch Press Release. https://fidoalliance.org/assets/downloads/FIDO_Alliance_launch__FINAL__02_12_13docx.pdf - FIDO Alliance founding announcement
  16. (2020). FIDO UAF Protocol Specification. https://fidoalliance.org/specs/fido-uaf-v1.2-ps-20201020/fido-uaf-protocol-v1.2-ps-20201020.html - Official FIDO UAF specification for passwordless local authentication
  17. (2017). Universal 2nd Factor (U2F) Overview. https://fidoalliance.org/specs/fido-u2f-v1.2-ps-20170411/fido-u2f-overview-v1.2-ps-20170411.html - Official FIDO U2F overview for hardware-token second-factor authentication
  18. How FIDO Works. https://fidoalliance.org/how-fido-works/ - FIDO2 protocol mechanics
  19. Windows Hello for Business Overview. https://learn.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/ - Official WHfB documentation
  20. Windows Hello Biometric Requirements. https://learn.microsoft.com/en-us/windows-hardware/design/device-experiences/windows-hello-biometric-requirements - FAR/FRR certification thresholds
  21. Optic ID, Face ID, Touch ID, passcodes, and passwords. https://support.apple.com/en-ca/guide/security/sec9479035f1/web - Apple Platform Security page stating Face ID false-accept probability
  22. (2019). Web Authentication: An API for accessing Public Key Credentials Level 1. https://www.w3.org/TR/2019/REC-webauthn-1-20190304/ - WebAuthn W3C Recommendation
  23. (2019). Android Now FIDO2 Certified, Accelerating Global Migration Beyond Passwords. https://fidoalliance.org/android-now-fido2-certified-accelerating-global-migration-beyond-passwords/ - Android FIDO2 platform-authenticator certification before Windows Hello certification
  24. (2019). Microsoft Achieves FIDO2 Certification for Windows Hello. https://fidoalliance.org/microsoft-achieves-fido2-certification-for-windows-hello/ - Windows Hello FIDO2 certification
  25. (2022). Windows Hello for Business Hybrid Cloud Kerberos Trust is now available!. https://techcommunity.microsoft.com/blog/windows-itpro-blog/windows-hello-for-business-hybrid-cloud-kerberos-trust-is-now-available/3651049 - Microsoft announcement of the Cloud Trust deployment model
  26. Omer Tsarfati (2021). Bypassing Windows Hello Without Masks or Plastic Surgery. https://www.cyberark.com/resources/threat-research-blog/bypassing-windows-hello-without-masks-or-plastic-surgery - CVE-2021-34466 USB IR camera spoofing
  27. CVE-2021-34466 - MSRC. https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34466 - Microsoft security advisory for Hello bypass
  28. Bowen Hu, Kuo Wang, & Chip Hong Chang (2025). Red Bleed: A Pragmatic Near-Infrared Presentation Attack. https://www.usenix.org/conference/usenixsecurity25/presentation/hu-bowen - NIR presentation attack on Windows Hello at USENIX Security 2025
  29. CVE-2025-26644 - Wiz Vulnerability Database. https://www.wiz.io/vulnerability-database/cve/cve-2025-26644 - Red Bleed CVE details
  30. CVE-2025-26644 - NVD. https://nvd.nist.gov/vuln/detail/CVE-2025-26644 - Red Bleed CVE entry
  31. Bowen Hu, Kuo Wang, & Chip Hong Chang (2025). Red Bleed Full Paper. https://www.usenix.org/system/files/usenixsecurity25-hu-bowen.pdf - Full Red Bleed paper PDF
  32. (2025). Black Hat USA 2025 | Windows Hell No for Business. https://www.youtube.com/watch?v=SkWZ5KcelD4 - Official Black Hat conference video for the David and Oßwald briefing that covered Faceplant
  33. Tillmann Osswald & Baptiste David (2025). Faceplant: Planting Biometric Templates. https://insinuator.net/2025/08/windows-hello-for-buiness-faceplant-planting-biometric-templates/ - CVE-2026-20804 biometric template injection
  34. (2022). Apple, Google, and Microsoft Commit to Expanded Support for FIDO Standard. https://www.apple.com/newsroom/2022/05/apple-google-and-microsoft-commit-to-expanded-support-for-fido-standard/ - Joint passkeys commitment
  35. Passkeys - Apple Platform Security. https://support.apple.com/guide/security/passkeys-sec50554cb94/web - Apple passkey security architecture
  36. Passkeys - Google Identity. https://developers.google.com/identity/passkeys - Google passkey architecture
  37. FIDO Alliance Specifications. https://fidoalliance.org/specifications/ - FIDO specification collection including UAF, U2F, and FIDO2
  38. Authentication Assurance Levels. https://pages.nist.gov/800-63-4/sp800-63b/aal/ - NIST SP 800-63B AAL requirements, including AAL3 hardware and phishing resistance
  39. Windows Hello for Business Deployment. https://learn.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/deploy/ - WHfB deployment planning
  40. Passwordless Authentication with Entra ID. https://learn.microsoft.com/en-us/entra/identity/authentication/concept-authentication-passwordless - Entra ID passkey architecture
  41. Anil K. Jain, Arun Ross, & Salil Prabhakar (2004). An Introduction to Biometric Recognition. https://ieeexplore.ieee.org/document/1262027 - Seminal survey formalizing FAR, FRR, and biometric performance metrics
  42. FIDO Alliance Publishes New Specifications for Credential Exchange. https://fidoalliance.org/fido-alliance-publishes-new-specifications-to-promote-user-choice-and-enhanced-ux-for-passkeys/ - CXP/CXF draft specifications
  43. Post-Quantum Cryptography - NIST. https://csrc.nist.gov/projects/post-quantum-cryptography - NIST PQC standards and migration guidance
  44. Web Authentication Level 3. https://www.w3.org/TR/webauthn-3/ - WebAuthn Level 3 specification
  45. (2025). Microsoft Sets Passkeys Default for New Accounts. https://thehackernews.com/2025/05/microsoft-sets-passkeys-default-for-new.html - Passwordless by default news coverage