A Spotlight on Remote Authentication