Toggle navigation
Login/Register
Resilient-to-Leaks-from-Other-Verifiers
Description
No information that leaks from a verifier can be used by an attacker to successfully impersonate the user to any other verifier.
Login / Register to take part in Discussion!