California LEO attempts to bypass biometric security en masse

N&P: Discuss governments, nations, politics and recent related news here.

Moderators: Alyrium Denryle, Edi, K. A. Pital

Post Reply
User avatar
White Haven
Sith Acolyte
Posts: 6360
Joined: 2004-05-17 03:14pm
Location: The North Remembers, When It Can Be Bothered

California LEO attempts to bypass biometric security en masse

Post by White Haven »

Forbes wrote:Feds Walk Into A Building. Demand Everyone's Fingerprints To Open Phones

In what’s believed to be an unprecedented attempt to bypass the security of Apple iPhones, or any smartphone that uses fingerprints to unlock, California’s top cops asked to enter a residence and force anyone inside to use their biometric information to open their mobile devices.

FORBES found a court filing, dated May 9 2016, in which the Department of Justice sought to search a Lancaster, California, property. But there was a more remarkable aspect of the search, as pointed out in the memorandum: “authorization to depress the fingerprints and thumbprints of every person who is located at the SUBJECT PREMISES during the execution of the search and who is reasonably believed by law enforcement to be the user of a fingerprint sensor-enabled device that is located at the SUBJECT PREMISES and falls within the scope of the warrant.” The warrant was not available to the public, nor were other documents related to the case.

According to the memorandum, signed off by U.S. attorney for the Central District of California Eileen Decker, the government asked for even more than just fingerprints: “While the government does not know ahead of time the identity of every digital device or fingerprint (or indeed, every other piece of evidence) that it will find in the search, it has demonstrated probable cause that evidence may exist at the search location, and needs the ability to gain access to those devices and maintain that access to search them. For that reason, the warrant authorizes the seizure of ‘passwords, encryption keys, and other access devices that may be necessary to access the device,’” the document read.

Legal experts were shocked at the government’s request. “They want the ability to get a warrant on the assumption that they will learn more after they have a warrant,” said Marina Medvin of Medvin Law. “Essentially, they are seeking to have the ability to convince people to comply by providing their fingerprints to law enforcement under the color of law – because of the fact that they already have a warrant. They want to leverage this warrant to induce compliance by people they decide are suspects later on. This would be an unbelievably audacious abuse of power if it were permitted.”

Jennifer Lynch, senior staff attorney at the Electronic Frontier Foundation (EFF), added: “It’s not enough for a government to just say we have a warrant to search this house and therefore this person should unlock their phone. The government needs to say specifically what information they expect to find on the phone, how that relates to criminal activity and I would argue they need to set up a way to access only the information that is relevant to the investigation.

“The warrant has to be particular in how it describes the place to be searched and the thing to be seized and limited in scope. That’s why if a government suspects criminal activity to be happening on a property and there are 50 apartments in that property they have to specify which apartment and why and what they expect to find there.”

Whilst the DoJ declined to comment, FORBES was able to contact a resident at the property in question, but they refused to provide details on the investigation. They did, however, indicate the warrant was served. “They should have never come to my house,” the person said. (In an attempt to protect the residents’ privacy, FORBES has chosen to censor the address from the memorandum posted below and concealed their name. But the document is public – search hard enough and you’ll find it). “I did not know about it till it was served… my family and I are trying to let this pass over because it was embarrassing to us and should’ve never happened.” They said neither they nor any relatives living at the address had ever been accused of being part of any crime, but declined to offer more information.

“We’ve never seen anything like this,” Lynch added. Indeed, the memorandum has revealed the first known attempt by the government to acquire fingerprints of multiple individuals in a certain location to unlock smartphones.

The document also showed the government isn’t afraid of getting inventive to bypass the security of modern smartphones. Faced with growing technical difficulties of unlocking phones, the government has sought to find new legal measures allowing them easy routes in, hence the All Writs Act order that demanded Apple open the iPhone 5C of San Bernardino shooter Syed Rizwan Farook. But with Apple refusing to comply with the order, and pushback from the likes of Google and Microsoft, cops are increasingly looking to fingerprints as one option for searching smartphones.

FORBES revealed earlier this year one of the first-known warrants demanding a suspect depress their fingerprints to open an iPhone, filed by Los Angeles police in February. This publication also uncovered a case in May where feds investigating an alleged sex trafficking racket wanted access to a suspect’s iPhone 5S with his fingerprints. Both were ultimately unsuccessful in opening the devices.

The Michigan State Police Department had more luck this summer by asking a university professor to create a fake fingerprint that could unlock a Samsung Galaxy S6. The team, led by Dr. Anil Jain, succeeded. He told FORBES in July the same techniques worked on an iPhone 6 and a Samsung S7.

Is it legal?

The memorandum – which specifically named Apple, Samsung, Motorola and HTC as manufacturers of fingerprint-based authentication – outlined the government’s argument that taking citizens’ fingerprint or thumbprint without permission violated neither the Fifth nor Fourth Amendment. In past interpretations of the Fifth Amendment, suspects have not been compelled to hand over their passcode as it could amount to self-incrimination, but the same protections have not been afforded for people’s body data even if the eventual effect is the same. Citing a Supreme Court decision in Schmerber v. California, a 1966 case in which the police took a suspect’s blood without his consent, the government said self-incrimination protections would not apply to the use of a person’s “body as evidence when it may be material.”

It also cited Holt v. United States, a 1910 case, and United States v. Dionisio, a 1973 case, though it did point to more recent cases, including Virginia v. Baust, where the defendant was compelled to provide his fingerprint to unlock a device (though Baust did provide his biometric data, it failed to open the iPhone; after 48 hours of not using Touch ID or a reboot Apple asks for the code to be re-entered.).

As for the Fourth, the feds said protections against unreasonable searches did not stand up when “the taking of fingerprints is supported by reasonable suspicion,” citing 1985′s Hayes v. Florida. Other cases, dated well before the advent of smartphones, were used to justify any brief detention that would arise from forcing someone to open their device with a fingerprint.

The justifications didn’t wash with Medvin or Lynch. Of the Fourth Amendment argument, Medvin said the police don’t have the right to search a person or a place in hopes of justifying the search later as reasonable. “That’s not how the 4th Amendment works,” Medvin added. “You need to have a reasonable basis before you begin the search – that reasonable basis is what allows you to search in the first place.”

“The reason I’m so concerned about this … is that it’s so broad in scope and the government is relying on these outdated cases to give it access to this amazing amount of information… The part the government is ignoring here is the vast amount of data that’s on the phone,” Lynch added.

“If this kind of thing became law then there would be nothing to prevent… a search of every phone at a certain location.”
Okay, initial thoughts here. First off, BAD Forbes, this is California law enforcement, not Federal. While I have no doubt the FBI will be greasily overjoyed if this ends up as upheld precedent, accurate reporting is still critical. Moving on from that point, however. this is the fishiest of fishing tactics. I get that law enforcement detests both the idea of encryption and those of the 4th and 5th amendments, but those ships have sailed and I for one am getting extremely tired of constant attempts to end-run around them. I can't help but wish there was some sort of way to tie a punishment to, oh, call it 'Attempted Violation of the US Constitution' by government representatives; maybe then it wouldn't be tried so damned often.

This isn't as damaging or as dangerous as the FBI's incessant attempts to go after encryption methods themselves, but it does put a chilling effect on the use of biometric authentication. If courts keep upholding constitutional protections on passwords but NOT on biometrics, it reduces overall confidence in biometric security, not unreasonably. That, in turn, pushes people back onto passwords which in practice are often far less secure than biometrics, and that has the potential to degrade IT security as an aggregate whole. Stop it, guys. Seriously. Please. Just let it go.

Then, as a separate problem, we have the it-would-be-hilarious-if-it-weren't-serious breadth of the warrant itself, that being not for a specific individual device or a selection of devices, but just everything they happen to pick up. I'm neither a lawyer nor a law enforcement officer myself, but that strikes me as massively over-broad, especially given the amount of sensitive, private information contained both in personal electronic devices and in remote accounts linked to them. That runs into another potential issue; law enforcement has historically needed warrants to access specific accounts on specific services (say, a suspect's Yahoo email account or some such). With an incredibly broad warrant like this, they just get to scoop that up with everything else because accessing the phone accesses accounts configured ON the phone.

In summary, there is practically no part of this particular shitfest that I don't have a problem with.
Image
Image
Chronological Incontinence: Time warps around the poster. The thread topic winks out of existence and reappears in 1d10 posts.

Out of Context Theatre, this week starring Darth Nostril.
-'If you really want to fuck with these idiots tell them that there is a vaccine for chemtrails.'

Fiction!: The Final War (Bolo/Lovecraft) (Ch 7 9/15/11), Living (D&D, Complete)Image
User avatar
AMX
Jedi Knight
Posts: 853
Joined: 2004-09-30 06:43am

Re: California LEO attempts to bypass biometric security en masse

Post by AMX »

White Haven wrote:...passwords which in practice are often far less secure than biometrics...
Source?
Last I checked, biometrics were fundamentally unsuited for authentication.

I agree with everything else in your post.
User avatar
TheFeniX
Sith Marauder
Posts: 4869
Joined: 2003-06-26 04:24pm
Location: Texas

Re: California LEO attempts to bypass biometric security en masse

Post by TheFeniX »

White Haven wrote:I get that law enforcement detests both the idea of encryption and those of the 4th and 5th amendments, but those ships have sailed and I for one am getting extremely tired of constant attempts to end-run around them.
It will never end. U.S. Citizens have had to fight just to get law enforcement to recognize rights at all. They will always try to backdoor in anything that makes their job easier, rights or no rights.
If courts keep upholding constitutional protections on passwords but NOT on biometrics, it reduces overall confidence in biometric security, not unreasonably. That, in turn, pushes people back onto passwords which in practice are often far less secure than biometrics, and that has the potential to degrade IT security as an aggregate whole. Stop it, guys. Seriously. Please. Just let it go.
This was my first thought: unless the police are willing to beat it out of me, they aren't getting my passwords. But biometrics are easily bypassed by the unscrupulous. They only identify who is authenticating, not if that person wants to authenticate.

It's why I don't use biometrics unless I can also used a passcode/PIN. I think this could possibly lead to authentication systems that are destructive when given a certain passcode or biometric scan. I've got nothing on my phone but pictures of my son, but I'd brick it before handing it over to police. Bonus points if said system played "Fuck tha police" at max volume until you pulled the battery.
User avatar
White Haven
Sith Acolyte
Posts: 6360
Joined: 2004-05-17 03:14pm
Location: The North Remembers, When It Can Be Bothered

Re: California LEO attempts to bypass biometric security en masse

Post by White Haven »

Issues with password security abound. Yes, it is possible to create passwords so long and so complex that they are effectively uncrackable in anything but the hilariously long term. The vast majority of these passwords, however, are effectively useless for the current vast majority of people who do not employ a password-manager of some kind, as they are too complex and lengthy to actually remember. That leads us over to problem two with passwords, their frequent re-use. It doesn't matter how secure your bank's website is if you used the same password on some crackerjack Canadian debate forum (I kid, I kid, love you guys) that ends up compromised due to ten-year-old software and security measures. This is compounded by the proliferation of password rules on websites that are often beyond useless and rate as 'strong' passwords that are anything but. In practice, in the real world of actual IT security implementations, this leads to a lot of people using a small number of frequently-reused, relatively-weak passwords, and then acting surprised when they get breached.

Now, that's not to say that biometrics are perfect. They're inherently imprecise as they have to read something decidedly analog and make use of it. You can't just check against the hash of a retinal scan, because it'll be subtly different every time; subtle differences can (must, really, for a password hashing system to be of any use) lead to immense changes in the result. Even more troubling, that means you need to store the actual data, not the hash of the data, (for the uninitiated, a hash if a form of encryption that cannot be run backwards, allowing normal passwords to be checked without actually having to store the password itself) in the device so that it can actually compare to the result coming in from whatever scanner it uses. That's a security nightmare from the perspective of an already-compromised device, as it means that the stored data for whatever biometric authentication is being used can simply be harvested from the user profile if whatever encryption is being used has been broken or bypassed. That said, they are by FAR the best option currently available for securing mobile devices in particular, because you can't realistically use a password manager to store a strong password, nor will any real-world user ever have anything even vaguely resembling a strong password for a phone that they're expecting to tap to life within seconds dozens of times a day. Two-factor authentication (usually a verification email sent to a separate account with an authorization code) is also not an option for a mobile device, because in the majority of cases the mobile device is what would be needed to access the email in the first place (as well as being too cumbersome for the aforementioned quick access).

Of the available practical options for mobile devices (biometrics, or a deliberately-extremely-weak-for-ease-of-entry password), biometric authentication is vastly more secure. Thank you for calling me out, though, as on reflection I can see how my statements earlier could be read as referring to passwords versus biometrics as a whole, rather then when applied to mobile device access.
Image
Image
Chronological Incontinence: Time warps around the poster. The thread topic winks out of existence and reappears in 1d10 posts.

Out of Context Theatre, this week starring Darth Nostril.
-'If you really want to fuck with these idiots tell them that there is a vaccine for chemtrails.'

Fiction!: The Final War (Bolo/Lovecraft) (Ch 7 9/15/11), Living (D&D, Complete)Image
User avatar
Joun_Lord
Jedi Master
Posts: 1211
Joined: 2014-09-27 01:40am
Location: West by Golly Virginia

Re: California LEO attempts to bypass biometric security en masse

Post by Joun_Lord »

TheFeniX wrote:I think this could possibly lead to authentication systems that are destructive when given a certain passcode or biometric scan.
I'd worry that would get people in trouble for destroying evidence even if there is no evidence to gather. Plus might get in a situation where having the software or hardware to wreck your phone leads to that old question "If you've got nothing to hide, you've got nothing to fear", why would you have such features on your phone if you have nothing illegal.

Presumably the tech already exists to create smartphones that would self destruct but I can find very little about them actually existing beyond some Boeing Black phone from 2014 that I'm not sure if was ever released. Is the tech not mature enough, too easy to destroy the phone inadvertently (maybe Samsung is testing the feature), or there some legal challenge to the tech being implemented?

I'd only get a phone with the self destruct feature only if it when it does so it says "this phone will self destruct in 10 seconds". I want to feel like a spy when erasing pictures of my cats.
User avatar
White Haven
Sith Acolyte
Posts: 6360
Joined: 2004-05-17 03:14pm
Location: The North Remembers, When It Can Be Bothered

Re: California LEO attempts to bypass biometric security en masse

Post by White Haven »

Get a Samsung, the effect is much the same. *rimshot*
Image
Image
Chronological Incontinence: Time warps around the poster. The thread topic winks out of existence and reappears in 1d10 posts.

Out of Context Theatre, this week starring Darth Nostril.
-'If you really want to fuck with these idiots tell them that there is a vaccine for chemtrails.'

Fiction!: The Final War (Bolo/Lovecraft) (Ch 7 9/15/11), Living (D&D, Complete)Image
User avatar
TheFeniX
Sith Marauder
Posts: 4869
Joined: 2003-06-26 04:24pm
Location: Texas

Re: California LEO attempts to bypass biometric security en masse

Post by TheFeniX »

White Haven wrote:Issues with password security abound. Yes, it is possible to create passwords so long and so complex that they are effectively uncrackable in anything but the hilariously long term. The vast majority of these passwords, however, are effectively useless for the current vast majority of people who do not employ a password-manager of some kind, as they are too complex and lengthy to actually remember.
I tend to go with xkcd when it's hard to find a fault with the logic.

The password "ihaterememberingfuckingpasswords" is alone pretty strong, but, as said, certain password requirements are dumb, but can also be included.

"Ineed$$$4STDmedication"

"thisistheworstpostfenixevermadeifuckinghatethatguy4321" is overkill and easy to remember because fuck that guy.
Joun_Lord wrote:I'd worry that would get people in trouble for destroying evidence even if there is no evidence to gather. Plus might get in a situation where having the software or hardware to wreck your phone leads to that old question "If you've got nothing to hide, you've got nothing to fear", why would you have such features on your phone if you have nothing illegal.
Yea, better have a good lawyer when they try to make an example out of you.
User avatar
Terralthra
Requiescat in Pace
Posts: 4741
Joined: 2007-10-05 09:55pm
Location: San Francisco, California, United States

Re: California LEO attempts to bypass biometric security en masse

Post by Terralthra »

The other problem with biometrics is that they allow a feasible link between "anything done on your phone" and "you". A password can be guessed or cracked, and one might, in court, argue plausibly that you were not in possession of your phone to make an incriminating call or text message or whatnot. A fingerprint-unlock is much harder to make that argument against.
User avatar
AMX
Jedi Knight
Posts: 853
Joined: 2004-09-30 06:43am

Re: California LEO attempts to bypass biometric security en masse

Post by AMX »

I see.
Still suspicious of biometrics - with fingerprints, I basically "reuse my password" every time it pick up anything; and once somebody has lifted my prints, what am I supposed to do to fix that? Grow another pair of hands?
User avatar
TheFeniX
Sith Marauder
Posts: 4869
Joined: 2003-06-26 04:24pm
Location: Texas

Re: California LEO attempts to bypass biometric security en masse

Post by TheFeniX »

AMX wrote:I see.
Still suspicious of biometrics - with fingerprints, I basically "reuse my password" every time it pick up anything; and once somebody has lifted my prints, what am I supposed to do to fix that? Grow another pair of hands?
Biometrics were never meant to be a replacement for passwords. They're merely the "who/what you are" part of multi-factor authentication. They were additive to what you have (smartcards, RFIDs, ID Cards, etc) and what you know (passwords/PINs).

While "what you have" is probably the weakest form of authentication as they can be stolen (or forged) and used without your knowldge, you also (like you said) can't remove yourself from "what you are" nor realistically change it. Passwords will always be the strongest singular form of authentication because you can't get it via physical access alone (unless you write it down, which you should never be doing).

"hereismypasswordgoodluckhackingitfucker" is very secure and easy to remember, but people are so scared of dictionary attacks when they're really only an issue if your password is "Jake" or "password," they want 1234123412CAPTAILSAND@$%#$# shit in everything. But "mypasswordisjake" is actually pretty tough to crack.
User avatar
Elheru Aran
Emperor's Hand
Posts: 13073
Joined: 2004-03-04 01:15am
Location: Georgia

Re: California LEO attempts to bypass biometric security en masse

Post by Elheru Aran »

AMX wrote:I see.
Still suspicious of biometrics - with fingerprints, I basically "reuse my password" every time it pick up anything; and once somebody has lifted my prints, what am I supposed to do to fix that? Grow another pair of hands?
Conceivably, you could try to scarify your fingerprint. Shallow cuts and such will grow out after a few weeks/months (depends on how fast your body heals), but a deeper injury will leave a more or less permanent mark. Source: I've got a line across my thumbprint from a deep burn I got when I was a kid.

However, in practical (and less self-harming) terms, yeah, no, you're basically done there. You'd have to shift to another version of biometrics or simply use password locks or something else.
It's a strange world. Let's keep it that way.
User avatar
Ace Pace
Hardware Lover
Posts: 8456
Joined: 2002-07-07 03:04am
Location: Wasting time instead of money
Contact:

Re: California LEO attempts to bypass biometric security en masse

Post by Ace Pace »

AMX wrote:I see.
Still suspicious of biometrics - with fingerprints, I basically "reuse my password" every time it pick up anything; and once somebody has lifted my prints, what am I supposed to do to fix that? Grow another pair of hands?
Except that has little to do with how modern fingerprint sensors work. Even back when they were introduced, fooling them required large investments.
First you need some kind of colored powder or superglue to lift the fingerprint. Then you have to scan the fingerprint, invert it and print it with a resolution of 1200dpi or more onto a transparent sheet. After that, you build your fake finger by smearing pink latex milk or white wood glue into the pattern that the toner created onto the transparent sheet and wait for it to set. Finally, the CCC writes, “the thin latex sheet is lifted from the sheet, breathed on to make it a tiny bit moist and then placed onto the sensor to unlock the phone.” This method should work for virtually every fingerprint scanner on the market today.
Modern sensors work with more than just surface "fingerprint patterns" and require something closer to a live hand.

To continue on what others are saying, biometric sensors are part of the package and are already quite good. They're a replacement for the vast majority of people who continue to use bad passwords because they lack any usable alternatives.
Brotherhood of the Bear | HAB | Mess | SDnet archivist |
User avatar
AMX
Jedi Knight
Posts: 853
Joined: 2004-09-30 06:43am

Re: California LEO attempts to bypass biometric security en masse

Post by AMX »

Ace Pace wrote:Except that has little to do with how modern fingerprint sensors work. Even back when they were introduced, fooling them required large investments.
Seriously?
The Artivle wrote:First you need some kind of colored powder or superglue to lift the fingerprint. Then you have to scan the fingerprint, invert it and print it with a resolution of 1200dpi or more onto a transparent sheet. After that, you build your fake finger by smearing pink latex milk or white wood glue into the pattern that the toner created onto the transparent sheet and wait for it to set. Finally, the CCC writes, “the thin latex sheet is lifted from the sheet, breathed on to make it a tiny bit moist and then placed onto the sensor to unlock the phone.” This method should work for virtually every fingerprint scanner on the market today.
That's hardly what I'd call a "large investment."
User avatar
Elheru Aran
Emperor's Hand
Posts: 13073
Joined: 2004-03-04 01:15am
Location: Georgia

Re: California LEO attempts to bypass biometric security en masse

Post by Elheru Aran »

I should note that theoretically, you should be able to use a *toe* print as a biometric. They are just as unique as your fingerprints, after all, and you've got ten of them to use. Admittedly, having to take your shoe off every time you use your phone might be an hassle... but say you need a lock on a specific piece of software or something on your phone or whatever; it could be useful there. Toe prints are also going to be a lot harder for people to get ahold of than fingerprints.
It's a strange world. Let's keep it that way.
User avatar
TheFeniX
Sith Marauder
Posts: 4869
Joined: 2003-06-26 04:24pm
Location: Texas

Re: California LEO attempts to bypass biometric security en masse

Post by TheFeniX »

The problem with biometrics in this particular instance is if they want a "sample:" they're going to take it. We are talking about a force that has tried to get underage kids to have a chemically induced erection to compare dick pics with and have repeatedly sexually assaulted/raped at least one woman on dubious claims of drugs being hidden in her vagina (that one was done without even a warrant and in a public space).

If they want your fingerprints/etc: they'll get them. But a good password cannot be obtained from you without some form of consent. And in the time it takes to get that consent, you at least might have time to get a lawyer and/or public opinion on your side.
User avatar
Ace Pace
Hardware Lover
Posts: 8456
Joined: 2002-07-07 03:04am
Location: Wasting time instead of money
Contact:

Re: California LEO attempts to bypass biometric security en masse

Post by Ace Pace »

AMX wrote:
Ace Pace wrote:Except that has little to do with how modern fingerprint sensors work. Even back when they were introduced, fooling them required large investments.
Seriously?
The Artivle wrote:First you need some kind of colored powder or superglue to lift the fingerprint. Then you have to scan the fingerprint, invert it and print it with a resolution of 1200dpi or more onto a transparent sheet. After that, you build your fake finger by smearing pink latex milk or white wood glue into the pattern that the toner created onto the transparent sheet and wait for it to set. Finally, the CCC writes, “the thin latex sheet is lifted from the sheet, breathed on to make it a tiny bit moist and then placed onto the sensor to unlock the phone.” This method should work for virtually every fingerprint scanner on the market today.
That's hardly what I'd call a "large investment."

Yes, it's rather large. This requires a targeted reason to get your fingerprint.

In that case, you usually have bigger worries. Such as the fact it's still feasible for private individuals to break into an iPhone, nevermind corporations or governments.
Brotherhood of the Bear | HAB | Mess | SDnet archivist |
User avatar
AMX
Jedi Knight
Posts: 853
Joined: 2004-09-30 06:43am

Re: California LEO attempts to bypass biometric security en masse

Post by AMX »

Ace Pace wrote:Yes, it's rather large. This requires a targeted reason to get your fingerprint.
I'm not sure I'm following you - are you seriously trying to tell me that people attack biometrically-secured devices only if they have a specific reason to do so, but attack password-secured devices without any reason whatsoever?

Or is the emphasis on "targeted?" In that case, read the fucking OP. That's not exactly "targeted."
User avatar
madd0ct0r
Sith Acolyte
Posts: 6259
Joined: 2008-03-14 07:47am

Re: California LEO attempts to bypass biometric security en masse

Post by madd0ct0r »

And in the case of the OP, a confiscated phone will have fingerprints on the case t to lift.
"Aid, trade, green technology and peace." - Hans Rosling.
"Welcome to SDN, where we can't see the forest because walking into trees repeatedly feels good, bro." - Mr Coffee
User avatar
Ace Pace
Hardware Lover
Posts: 8456
Joined: 2002-07-07 03:04am
Location: Wasting time instead of money
Contact:

Re: California LEO attempts to bypass biometric security en masse

Post by Ace Pace »

AMX wrote:
Ace Pace wrote:Yes, it's rather large. This requires a targeted reason to get your fingerprint.
I'm not sure I'm following you - are you seriously trying to tell me that people attack biometrically-secured devices only if they have a specific reason to do so, but attack password-secured devices without any reason whatsoever?

Or is the emphasis on "targeted?" In that case, read the fucking OP. That's not exactly "targeted."
It means you as a person specifically. This is not something mass scale, this requires deciding that you, AMX are interesting enough to setup such a device.

I'm not sure you've ever been on the other side of one of these things, but none of these "awesome wow" exploits are easy to mass-use. Doesn't matter if they're purely digital or if they're a mix like in this case.

And yes, people attack password-secured device far more than non passwords because guess what, passwords are not that fucking hard to crack in most cases. With or without brute force protection. Most people create really crappy ones that don't require anything near the real theoretical complexity of passwords.
Brotherhood of the Bear | HAB | Mess | SDnet archivist |
User avatar
AMX
Jedi Knight
Posts: 853
Joined: 2004-09-30 06:43am

Re: California LEO attempts to bypass biometric security en masse

Post by AMX »

Ace Pace wrote:It means you as a person specifically. This is not something mass scale, this requires deciding that you, AMX are interesting enough to setup such a device.
You still didn't read the OP, did you?

And "such a device?" The only significant piece of hardware needed is a mid-range laser printer!

Fuck this. I'm done talking to you.
Post Reply