The user is not significantly hindered when entering the secret or there is no delay due to events, which are not directly related to the input of the secret. In addition, the user's input is not dependent on the verifier. For example, the user does not have to wait for an SMS with a code from the verifier to complete the authentication process on the user side.