If you have secrets that are very valuable, you are outside the standard use case, and should probably use more advanced authentication.
If you have secrets that are very valuable, you are outside the standard use case, and should probably use more advanced authentication.