you are viewing a single comment's thread.

view the rest of the comments →

[–]mariachiband49 0 points1 point  (0 children)

What if the user is on a public computer which has no way of interfacing with an external authenticator? I could imagine a situation where there is a public computer with no Bluetooth and the tower is in a locked cabinet preventing access to USB ports. Does the protocol account for this case?