OpenAI locks high-risk ChatGPT accounts behind passkeys

Original: OpenAI launched Advanced Account Security for high-risk accounts View original →

Read in other languages: 한국어日本語
AI Apr 30, 2026 By Insights AI 2 min read 2 views Source

What changed for account security

OpenAI turned account hardening into a named product feature instead of leaving it scattered across settings. The company’s main X account said Advanced Account Security is now available for ChatGPT accounts as an opt-in mode for people at higher risk of digital attacks. That matters because a ChatGPT login no longer protects only chat history. It can also sit at the center of Codex sessions, connected apps, and a growing amount of personal and professional context.

“Advanced Account Security” adds “phishing-resistant sign-in and more secure account recovery.”

OpenAI’s April 30 product page adds the operational details that make the feature material. Advanced Account Security replaces password-based login with passkeys or physical security keys, turns off email and SMS recovery, shortens session lifetime, and adds clearer session management and login alerts. It also applies to Codex when the same login is used there. For especially sensitive users, OpenAI says conversations from enrolled accounts are automatically excluded from model training, removing one more setting those people would otherwise need to remember to flip.

Why OpenAI is narrowing recovery on purpose

The sharpest design choice is recovery. OpenAI says enrolled users must rely on backup passkeys, security keys, and recovery keys, and that support will not be able to restore access for them through weaker fallback paths. That creates friction, but it is the right kind of friction for the people this feature targets: journalists, researchers, political figures, security teams, and anyone whose account could become a gateway to sensitive work.

There is also a policy signal here. OpenAI says individual members of Trusted Access for Cyber will have to enable this mode beginning June 1, 2026 unless their organization can attest to phishing-resistant single sign-on. That moves the feature from optional best practice toward baseline protection for the most sensitive users on the platform. What to watch next is how quickly OpenAI extends the same controls into broader enterprise workflows and whether users tolerate the stricter recovery model once they experience its tradeoffs firsthand. Source: OpenAI source tweet · OpenAI product page

Share: Long

Related Articles

Comments (0)

No comments yet. Be the first to comment!

Leave a Comment