Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The ulterior motive is compromised accounts and the support needed to deal with them is a tremendous waste of time and a liability.

Switching to hardware backed authentication reduces risk and support. Face/touch/PIN are an additional layer to protect against hardware theft.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: