It looks like because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable usernames and passwords are on their way out. No because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable will we have to worry about the security of our login because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable . They are set to be replaced by an because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable more secure login system known as Web Authentication. Web Authentication has become an official standard for logging in at the main Internet standards because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable , the World Wide Web Consortium (WWWC). It is a because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable that will be universally used by web browsers and platforms for simpler and stronger authentication because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable . It will allow website users to log in securely to their because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable accounts using a digital because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable , biometrics (such as fingerprints and facial recognition) or USB because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable keys. The WWWC spoke about the because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable of passwords being because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable . A spokesperson said: "It's because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable knowledge that passwords have outlived their because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable . Not only are stolen, weak or default passwords behind 81 per cent of data because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable , they are a drain of time and because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable ." It added: "Now is the time for web services and businesses to adopt Web Authentication to move beyond because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable passwords and help web users improve the security of their because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable experiences," Web Authentication means users are at because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable risk of having their passwords and credentials stolen. This is because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable login authentication is achieved via physical devices or biometrics from our body.