return2ozma@lemmy.world to Technology@lemmy.worldEnglish · 2 years agoStop Using Your Face or Thumb to Unlock Your Phonegizmodo.comexternal-linkmessage-square236linkfedilinkarrow-up1484arrow-down196
arrow-up1388arrow-down1external-linkStop Using Your Face or Thumb to Unlock Your Phonegizmodo.comreturn2ozma@lemmy.world to Technology@lemmy.worldEnglish · 2 years agomessage-square236linkfedilink
minus-squareBoozilla@lemmy.worldlinkfedilinkEnglisharrow-up2arrow-down1·2 years agodeleted by creator
minus-squarechrash0@lemmy.worldlinkfedilinkEnglisharrow-up1·2 years agolike i said, it’s more of a username than a password
minus-squareCupcake1972@mander.xyzlinkfedilinkEnglisharrow-up2arrow-down1·2 years agoFirst provide proof that you can pull out biometric data out of a secure element in a phone.
minus-squareBoozilla@lemmy.worldlinkfedilinkEnglisharrow-up1arrow-down1·edit-21 year agodeleted by creator
minus-squarericecake@sh.itjust.workslinkfedilinkEnglisharrow-up3arrow-down1·2 years agoThat’s not retrieving the biometric data from the device, that’s retrieving the biometric data from surveillance or physical interaction. It’s quite specifically the type of threat that most people do not need to worry about.
minus-squarericecake@sh.itjust.workslinkfedilinkEnglisharrow-up3·2 years agoThat’s a much better example. Physical access to the device by a sophisticated attacker is well outside the realm of most people’s risk profile.
deleted by creator
like i said, it’s more of a username than a password
First provide proof that you can pull out biometric data out of a secure element in a phone.
deleted by creator
That’s not retrieving the biometric data from the device, that’s retrieving the biometric data from surveillance or physical interaction.
It’s quite specifically the type of threat that most people do not need to worry about.
deleted by creator
That’s a much better example.
Physical access to the device by a sophisticated attacker is well outside the realm of most people’s risk profile.