@[email protected] to [email protected]English • 2 years agoStop Using Your Face or Thumb to Unlock Your Phonegizmodo.comexternal-linkmessage-square241fedilinkarrow-up1485
arrow-up1485external-linkStop Using Your Face or Thumb to Unlock Your Phonegizmodo.com@[email protected] to [email protected]English • 2 years agomessage-square241fedilink
minus-square@[email protected]linkfedilinkEnglish2•2 years agoFirst provide proof that you can pull out biometric data out of a secure element in a phone.
minus-squareBoozillalinkfedilinkEnglish1•2 years agohttps://en.wikipedia.org/wiki/Jan_Krissler?wprov=sfla1
minus-square@[email protected]linkfedilinkEnglish3•2 years agoThat’s not retrieving the biometric data from the device, that’s retrieving the biometric data from surveillance or physical interaction. It’s quite specifically the type of threat that most people do not need to worry about.
minus-squareBoozillalinkfedilinkEnglish1•2 years agohttps://macsecurity.net/view/408-apple-s-secure-enclave-is-exposed-to-a-new-unpatchable-exploit
minus-square@[email protected]linkfedilinkEnglish3•2 years agoThat’s a much better example. Physical access to the device by a sophisticated attacker is well outside the realm of most people’s risk profile.
First provide proof that you can pull out biometric data out of a secure element in a phone.
https://en.wikipedia.org/wiki/Jan_Krissler?wprov=sfla1
That’s not retrieving the biometric data from the device, that’s retrieving the biometric data from surveillance or physical interaction.
It’s quite specifically the type of threat that most people do not need to worry about.
https://macsecurity.net/view/408-apple-s-secure-enclave-is-exposed-to-a-new-unpatchable-exploit
That’s a much better example.
Physical access to the device by a sophisticated attacker is well outside the realm of most people’s risk profile.