Resilient-to-Leaks-from-Other-Verifiers


Description

No information that leaks from a verifier can be used by an attacker to successfully impersonate the user to any other verifier.