Do you know someone
who had their identity stolen?
What if someone got access to your e-mail? How about your medical records or legal documents? The problem is that our current methods of online or remote authentication can be easily copied by someone else, granting them the ability to gain access to sensitive information or imposing as ourselves.