468
you are viewing a single comment's thread
view the rest of the comments
[-] chrash0@lemmy.world 6 points 6 months ago

it’s an analogy that applies to me. tldr worrying about having my identity stolen via physical access to my phone isn’t part of my threat model. i live in a safe city, and i don’t have anything the police could find to incriminate me. everyone is going to have a different threat model. some people need to brick up their windows

[-] Boozilla@lemmy.world 2 points 6 months ago

Assuming the phone's security works as intended, what you're saying is true. However, it's a legit concern that the security is not airtight, and physical access is not actually required to harvest your biometric data.

I know the phone manufacturers make all sorts of claims about how secure biometric data is, but they have a profit motive to do so. I'm not being brick-up-my-windows paranoid by pointing out all the security failures and breaches we've seen over the years. Companies that have billions on the line are still frequently falling short at securing their own assets, much less their customer's data.

I understand biometrics are convenient, and many folks love the ease / coolness factor of using them. Just don't kid yourself that it's secure by requiring your physical phone. Once the dark web has a digital copy of your biometric data, it's compromised forever.

[-] Cupcake1972@mander.xyz 2 points 6 months ago

First provide proof that you can pull out biometric data out of a secure element in a phone.

[-] Boozilla@lemmy.world 1 points 6 months ago* (last edited 1 month ago)
[-] ricecake@sh.itjust.works 3 points 6 months ago

That's not retrieving the biometric data from the device, that's retrieving the biometric data from surveillance or physical interaction.
It's quite specifically the type of threat that most people do not need to worry about.

[-] Boozilla@lemmy.world 1 points 6 months ago
[-] ricecake@sh.itjust.works 3 points 6 months ago

That's a much better example.

Physical access to the device by a sophisticated attacker is well outside the realm of most people's risk profile.

[-] chrash0@lemmy.world 1 points 6 months ago

like i said, it’s more of a username than a password

this post was submitted on 28 Apr 2024
468 points (100.0% liked)

Technology

59554 readers
2755 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS