Hardware tokens make phishing attacks almost impossible (if they replace passwords, see above), since the only ... I don’t ...