• nimpnin@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    83
    arrow-down
    1
    ·
    1 天前

    Passwords should be paired with a second factor, preferably biometric, said Gunner, because it’s the most difficult for hackers to bypass.

    I think this is a pretty naive risk analysis. Hackers cracking my lemmy password is the least of my concerns. Having my biometric data leaked is one of my highest ones.

    • Jesus_666@lemmy.world
      link
      fedilink
      English
      arrow-up
      32
      arrow-down
      1
      ·
      1 天前

      I think Gunner means a biometrically unlocked second factor like a Yubikey or a smartphone’s user attestation. Given how badly written the entire article is, I wouldn’t be confused if that’s what he originally said before they condensed his statement beyond comprehension.

        • fascicle@leminal.space
          link
          fedilink
          English
          arrow-up
          2
          ·
          1 天前

          Don’t they just spit out the long password when you press them, I’d figure it would be easy to just plug it into your phone and copy the output if you had physical access

          • med@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            2
            ·
            6 小时前

            It’s OTP. Once a code has been seen, all the previous ones no longer work. There’s no point in copying.

            There’s a second slot that can be used for static passwords. But don’t, obviously.

    • Natanael@slrpnk.net
      link
      fedilink
      English
      arrow-up
      16
      ·
      1 天前

      Biometric is the worst lmao

      Passkeys or hardware based security keys is where it’s at

    • UndercoverUlrikHD@programming.dev
      link
      fedilink
      English
      arrow-up
      5
      ·
      1 天前

      Wouldn’t biometric data be sensor/implementation specific. I doubt the fingerprint data stored on an iPhone is the same as the one stored on an Xperia.

      • unexposedhazard@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        9
        arrow-down
        1
        ·
        1 天前

        Your fingerprint is your fingerprint. If its possible to extract the raw data, then that can be reconstructed into your fingerprint…

        • BorgDrone@feddit.nl
          link
          fedilink
          English
          arrow-up
          1
          ·
          5 小时前

          Fingerprint readers don’t store a raw copy of your fingerprint, to use a bad analogy: it’s like a biometric hash.

        • thisbenzingring@lemmy.today
          link
          fedilink
          English
          arrow-up
          4
          ·
          1 天前

          in the early 2000s when fingerprint readers started getting popular, my coworker and I decided to test them…

          super glue fumes, printer toner and scotch tape. that’s all that was ever needed to bypass the reader once you could isolate a good spot where someones finger left a good mark. like from drinking glass or a door knob

          I’m not sure if I’d ever trust a fingerprint to fully be a secure passkey

        • kn33@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 天前

          That’s the thing - it’s not possible. The fingerprint is only ever stored within the fingerprint module, with no method for retrieval. The only thing the phone sees is “did this person scan a matching fingerprint or not?”

        • UndercoverUlrikHD@programming.dev
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 天前

          Yeah, but what would you do with it? Can you convert the bytes to work on any other sensor the victim may also use their fingerprint? Never looked into the real implementation details of the fingerprint hardware.

          • Natanael@slrpnk.net
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 天前

            Sometimes you can. Or just bruteforce a colliding pattern that matches to print that instead, because why not