UAF is authentication by means of a local device with some biometric authentication factor. U2F uses a separate hardware token that can be used via USB, NFC, or Bluetooth LE — so basically, any modern computing device.
Please be sure to avoid saying UAF needs a "biometric" authenticator. Thats not really the case, you can use any device or potentially even software, for example an external devices where you have to enter your pin or password.
I think this is importend because way to often people say "UAF isch shity because biometric authentification is bad" and thus completly mis the point of the hole concept.
I do get the impression UAF is targeted mostly as a biometric authentication system — which I indeed dislike, so I do see your point. Perhaps the confusion stems from the UAF/U2F split and the examples shown.
It is true that Fido itself always uses biometric as an example. The casual finger print sensors on all phones and laptops will probebly be the most widly deployed authenticator.
Biometric authentication companies are part of the support base for the Fido Alliance and they always push Biometric into the front as well. There seems to be no company that is about to release a pin or password hardware authenticator that could advocate for the alternative.
Also the press loves the hole 'remove passwords' storyline.
Only for Fido UAF though. Fido U2F also attains the goal of reducing the knowledge factor to a PIN or something similar, but does this by employing discrete hardware tokens as the possession factor.
Have a look at this short overview:
https://fidoalliance.org/specifications/overview/
UAF is authentication by means of a local device with some biometric authentication factor. U2F uses a separate hardware token that can be used via USB, NFC, or Bluetooth LE — so basically, any modern computing device.