Search Again


1 search result for:

1

Why aren’t built-in authenticators in computers and mobile devices better than Security Keys?

There are three notable disadvantages from a security, privacy, and portability perspective. Security – Identity and authentication credentials are permanently connected to the computer or phone. If these devices are compromised (i.e. a rooted phone), they are subject to exploits and are subject to misuse of the stored credentials.  Furthermore, social attacks are common where […]