As a follow up of the previous note, here a link about hardware keys as a way to secure login without using a user-generated password, which I remind you, is the 80% cause of access breach.
Spotted a typo or (likely) a grammar error? Send a pull request.