Hardware Authentication Pros And Cons