About backup and recovery services
The authenticator solution or authenticator output is unveiled to your attacker as the subscriber is authenticating.This document assumes the subscriber is not really colluding having an attacker that is attempting to falsely authenticate towards the verifier. With this particular assumption in your mind, the threats towards the authenticator(s) us