All computers a typical user will touch are compromised or will be compromised in the future, its just a matter of how much.
The 2FA/MFA with OTP (one time passwords) can protect against compromised credentials and keyloggers but not screen scrapers or rootkits on the client device.
The problem with this is that the answers to any common set of personal questions one might ask are already public domain. To make it work he user would need to tell a secret to Safe that they have never told anywhere else and can’t be deduced from other personal info. This will be challenging. Seems a heck of a lot easier to educate users that they need to print multiple paper hard copies of their login credentials and store them in secure locations.
The “something you are” is a problem. Biometrics are dangerous. The last thing you want is to have your hand be the thing that opens up a $10M Safe account. The xcd comic you shared would involve an axe instead of a wrench at that point.
I would propose a slight modification to the triad:
- Something you know. (ex. I know which lock is mine…)
- Something you have. (ex. I have the correct key for my lock… )
- Something you can do. (ex. I can rotate the key 3 times clockwise and 2 times counter-clockwise to unlock my safe today…)
An example of “something you can do” might be to use what you have, and what you know, to give an OTP in response to a challenge question/riddle/puzzle.