Hacker News new | past | comments | ask | show | jobs | submit login

The point is that the combination of the three is the most powerful and secure. To copy something-you-are, they have to have access to you or things you've touched. To copy something-you-have, they have to steal the object itself. To copy something-you-know, they have to trick you into revealing it (phishing) or guess it. Requiring all three makes things that much more secure.



Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: