I think it has narrow applications in government high security areas and some corporate things where covert access can be a catastrophe. Also large datacenters and what not where an unknown physical compromise, while VERY difficult to achieve, could have tremendous repercussions.
In 90% of situations a bad actor will probably just use brute force. There is something to be said if this isn't bump-able/pick-able, in that at least you won't have the situation where a potential bad actor gains "covert" access, and so people think they're supposed to be there, as opposed to them kicking down the door, but the number of scenarios where that actually matters is slim.
In 90% of situations a bad actor will probably just use brute force. There is something to be said if this isn't bump-able/pick-able, in that at least you won't have the situation where a potential bad actor gains "covert" access, and so people think they're supposed to be there, as opposed to them kicking down the door, but the number of scenarios where that actually matters is slim.