it cloud services for Dummies
The authenticator mystery or authenticator output is unveiled into the attacker because the subscriber is authenticating.This doc assumes the subscriber isn't colluding using an attacker who's trying to falsely authenticate to the verifier. With this assumption in your mind, the threats to your authenticator(s) used for electronic authentication ar