this post was submitted on 28 Apr 2024
388 points (83.4% liked)

Technology

59374 readers
3392 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 1 points 6 months ago (1 children)

First provide proof that you can pull out biometric data out of a secure element in a phone.

[–] [email protected] 0 points 6 months ago* (last edited 4 weeks ago) (1 children)
[–] [email protected] 2 points 6 months ago (1 children)

That's not retrieving the biometric data from the device, that's retrieving the biometric data from surveillance or physical interaction.
It's quite specifically the type of threat that most people do not need to worry about.

[–] [email protected] 1 points 6 months ago (1 children)
[–] [email protected] 3 points 6 months ago

That's a much better example.

Physical access to the device by a sophisticated attacker is well outside the realm of most people's risk profile.