End-to-end encryption. During the authentication, a new end to end encryption system protocol ensures no active or passive MITM attack is effective.
Private credentials. The private key never leaves the browser and can never be stolen by MITM attacks. After the authentication signatures guarantee the user claims.
— Verizon Data Breach Report 2017
— Ponemon Report 2019
— Gartner research