Comment by riffraff 9 hours ago It does have the downside of requiring "trusted computing" (aka iOS and Android) on the client though. 1 comment riffraff Reply baxuz 7 hours ago Same as with NFC credit cards and similar auth mechanisms. You need hardware and OS-backed encryption that is tamper-proof.
baxuz 7 hours ago Same as with NFC credit cards and similar auth mechanisms. You need hardware and OS-backed encryption that is tamper-proof.
Same as with NFC credit cards and similar auth mechanisms. You need hardware and OS-backed encryption that is tamper-proof.