return2ozma@lemmy.world to Technology@lemmy.worldEnglish · 8 months agoStop Using Your Face or Thumb to Unlock Your Phonegizmodo.comexternal-linkmessage-square246fedilinkarrow-up1484arrow-down196cross-posted to: [email protected]
arrow-up1388arrow-down1external-linkStop Using Your Face or Thumb to Unlock Your Phonegizmodo.comreturn2ozma@lemmy.world to Technology@lemmy.worldEnglish · 8 months agomessage-square246fedilinkcross-posted to: [email protected]
minus-squareBoozilla@lemmy.worldlinkfedilinkEnglisharrow-up1arrow-down1·edit-22 months agohttps://en.wikipedia.org/wiki/Jan_Krissler
minus-squarericecake@sh.itjust.workslinkfedilinkEnglisharrow-up3arrow-down1·8 months agoThat’s not retrieving the biometric data from the device, that’s retrieving the biometric data from surveillance or physical interaction. It’s quite specifically the type of threat that most people do not need to worry about.
minus-squareBoozilla@lemmy.worldlinkfedilinkEnglisharrow-up1·8 months agohttps://macsecurity.net/view/408-apple-s-secure-enclave-is-exposed-to-a-new-unpatchable-exploit
minus-squarericecake@sh.itjust.workslinkfedilinkEnglisharrow-up3·8 months agoThat’s a much better example. Physical access to the device by a sophisticated attacker is well outside the realm of most people’s risk profile.
https://en.wikipedia.org/wiki/Jan_Krissler
That’s not retrieving the biometric data from the device, that’s retrieving the biometric data from surveillance or physical interaction.
It’s quite specifically the type of threat that most people do not need to worry about.
https://macsecurity.net/view/408-apple-s-secure-enclave-is-exposed-to-a-new-unpatchable-exploit
That’s a much better example.
Physical access to the device by a sophisticated attacker is well outside the realm of most people’s risk profile.