@Erklaerbaer@mastodon.social
Not for me either! On the surface they look like public key authentication made worse: the one you have less control over, tied to a particular device/browser or relying on someone's "ecosystem" for synchronisation across devices — leading to even greater centralisation, due to which to a greater degree phishing attacks became so effective in the first place…
@nixCraft