return2ozma@lemmy.world to Technology@lemmy.worldEnglish · 2 years agoStop Using Your Face or Thumb to Unlock Your Phonegizmodo.comexternal-linkmessage-square215fedilinkarrow-up1428arrow-down190
arrow-up1338arrow-down1external-linkStop Using Your Face or Thumb to Unlock Your Phonegizmodo.comreturn2ozma@lemmy.world to Technology@lemmy.worldEnglish · 2 years agomessage-square215fedilink
minus-squareBoozilla@lemmy.worldlinkfedilinkEnglisharrow-up2arrow-down1·2 years agodeleted by creator
minus-squareCupcake1972@mander.xyzlinkfedilinkEnglisharrow-up2arrow-down1·2 years agoFirst provide proof that you can pull out biometric data out of a secure element in a phone.
minus-squareBoozilla@lemmy.worldlinkfedilinkEnglisharrow-up1arrow-down1·edit-21 year agodeleted by creator
minus-squarericecake@sh.itjust.workslinkfedilinkEnglisharrow-up3arrow-down1·2 years agoThat’s not retrieving the biometric data from the device, that’s retrieving the biometric data from surveillance or physical interaction. It’s quite specifically the type of threat that most people do not need to worry about.
minus-squarericecake@sh.itjust.workslinkfedilinkEnglisharrow-up3·2 years agoThat’s a much better example. Physical access to the device by a sophisticated attacker is well outside the realm of most people’s risk profile.
minus-squarechrash0@lemmy.worldlinkfedilinkEnglisharrow-up1·2 years agolike i said, it’s more of a username than a password
deleted by creator
First provide proof that you can pull out biometric data out of a secure element in a phone.
deleted by creator
That’s not retrieving the biometric data from the device, that’s retrieving the biometric data from surveillance or physical interaction.
It’s quite specifically the type of threat that most people do not need to worry about.
deleted by creator
That’s a much better example.
Physical access to the device by a sophisticated attacker is well outside the realm of most people’s risk profile.
like i said, it’s more of a username than a password