If the security properties of a hardware authenticator aren't important to you, you don't need to use one at all.
If the security properties of a hardware authenticator aren't important to you, you don't need to use one at all.