REMME solves the problem of central servers that can be hacked as well as preventing attacks such as phishing, server and password breach, and password reuse attacks.
In addition, REMME does not store any information about its users or their certificates.You can access the certificate only by physically taking possession of the device (including its administrative rights). Because the information that is contained in the certificate is not transmitted over the network and is not written on blockchain, the status of the certificate and its HASH would be the only things recorded.
In cases where the device is stolen, the user has an option to revoke the certificate. The specific revocation method depends on the service provider’s choice: it can be made using 2FA option, email address or user's private key.