Security News > 2020 > November > The power of trusted endpoints
They've been used for ages with great success and, as a result, make the concept of possession as a primary factor easy for users to understand: "Keep your keys safe, it grants you access." There was never a need to add an extra layer of authentication.
After much experimenting with identification and endpoints, the iPhone can now act as a car key.
Limit the "Key" to a single use and having a unique "Key" for each mobile app.
Have the ability to issue keys to devices that users already have in their possession.
The vision of trusted endpoints is becoming a reality and finally, context-specific identities can be provisioned into most consumer devices.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/X-qUoSNZeBk/