Serious thieves (anyone doing it for a living that does not end up in prison in the first year of his career if ever) do select carefully their prey before doing anything, so yes they will know everything they need to know and set up every kind of equipment they need before they go against law in obvious ways.Zixinus wrote:however you will have to KNOW that I use fingerprint security AND know which finger I use. Unless you plan to steal data from me while you broke in, you are unlikely to have stolen something that has a good fingerprint.
Casual thieves (the ones that go in without any preparation, usually the dumb kids and the poor/desperate, the people that will come after your things 99% of the times) will be much more inclined to steal the whole computer and deal with passwords later (so how you encrypt data is pointless since the computer is lost anyway, it's much more useful to set up an unpassworded bait account and install spy softwares that can help you track down the computer when the idiot powers the thing up and uses the bait account).
Casual thieves are inherently stupid since not having preparation exposes them to the risk of breaking into the house and find a marine and his whole team just back from Shitholistan/a gun-nut with nightvision goggles wielding a silenced assault rifle per arm/booby-trapper and traps out of Addams Family/martial-arts-master/otherwise-dangerous-owner and getting their ass seriously kicked.
They won't break in unless they have already a fingerprint ready to use (and have assembled the thing to fool the scanner with). They can systematically steal all the fucking glasses you drank from at the pub, stuff you used at the office or whatever (depending from where they can go), taking stuff you drop at the cinema, or by sending an attractive woman/man or someone dressed as police or someone with an uniform (mail man requesting to sign papers to give you a letter someone mailed to you, for example it's classic method).Plus, if you have stolen something from me, you likely have accidentally wiped the fingerprint in process of transport.
Going into the home to get fingerprints isn't a so awesome idea, since it's a HIGH risk area where you already said there are fucktons of fingerprints at various ages (the fresher it is the better), whereas a pub or places where they can go legally it's far less risky and they get far better quality fingerprints.
Now, I don't see the point for this conspiracy-grade fuss. It's a computer defending at most your porn collection (and this means as long as fends off children and nosy puritans its security level is ok). Just stealing the lappy is sufficient to give them access to what they want, since laptop fingerprinting are usually so crappy that just resetting the BIOS (open up the machine, desolder the small battery from motherboard and leave it out for 30 mins, resolder and close up everything) gives you access to the machine since all BIOS passwords are cleared (this assuming the thing had fingerprints for BIOS password, usually not the case and none left passwords to protect bios), then a quick run of Offline NT Password & Registry Editor to nuke the windows passwords and you're in.
On average they just want to resell the laptop on Ebay, they don't give a shit about your data.
If fingerprints is all they need (let's say they can log into your banking account with them even if it's a fuckling dumb idea), then it's a piece of cake looking at you when you log in to see what is the finger and then recover that fingerprint as discussed above.
General rule of thumb, if Mythbusters can do it (see the linked video in my post above), then it's not hard.Irbis wrote:Okaaay. And just how much of these are recoverable to anyone without very specialized expertise?
It's murderously expensive if you use pro tools though.
Besides, if the enemy has physical access to the machine AND just wants to see your porn collection and not stealing your laptop why wasting time with fingerprints?, you either blocked the access to the whole HDD with a OS-indipendent tool (so that I cannot just bypass it with Puppy Linux on a pendrive or by physically mounting the drive into an external HDD enclosure and accessing it with another computer) or they copy (or if it's totally encrypted clone) the HDD and then have all the time of the world to figure out how to decrypt its contents.
I personally favor an approach consisting of "I keep all stuff I need from removable drives, what is on the computer is all clean and expendable". There is a good OS password and I'm not using an admin account, to keep out children and keep virus at bay, but that's it.
Not that I have massively secret stuff anyway.
If you use it in conjunction with human guards it is Pretty Fucking Safe, but if it's there by itself either is very high-end like retinal scans or it's totally worthless.Broomstick wrote:Biometric requirements enforce a certain level of "security".