Biometrics
Valuable for controlling local access to computer resources and cryptographic keys
Embraced by security experts to supplement and enhance digital signature security, rather than to substitute for it (for Internet purposes)
Biometric data compromise could allow an attacker to impersonate a legitimate user