Comment The Big, Bad Wolf (Score 3, Informative) 55
"Goodness, what big eyes you have!"
"The better to see you with, my dear."
SlickLogin's technology uses a combination of protocols to start the authentication process. WiFi, Bluetooth, or QR codes – to name a few – are used to verify that, yes, a user's smartphone is located somewhat near one's active desktop or laptop computer.
Use this and Google will be able to identify and tie your id with both your computer and your smartphone ... It's all about whoring the online you to their advertisers.