Network speed? Network data structures? Forever storage economics? Challenge-response authentication?

to be honest i don’t really understand the intention of your question - yes you could write different login-schemes mapping to very complex key+password+pin’s even without users recognizing.
No Data leaves your device unencrypted anyway - so this is something optional (and yes i’m very sure those login schemes will appear / will be used)

there are many ideas floating about making login more secure/easier:

2 Likes