The biometric side, the device side, and the behavior side never goes to the same vendor. Actually, it always goes to three different vendors. We assume one of them will be breached.
j previous speech k next speech