You are viewing a single comment's thread from:RE: Give Them the Finger - Wax Hand Fools AuthenticationView the full contextView the direct parentmrosenquist (71)in #cybersecurity • 6 years ago Agreed. It really comes down to the use-case for different authentication methods.