@becomingwisest @joeo10 Yup, it also requires the user to be really careless with their key around someone capable of fabricating a clone, whilst also handing that person their password. A bit of a storm in a teacup and they’re still safer than not using one.