this post was submitted on 28 Apr 2024
139 points (74.2% liked)

Technology

59583 readers
3287 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 4 points 6 months ago (4 children)

I've avoided willingly using biometrics so far. Though I'm sure our faces, gaits, body shapes, etc, are all stored somewhere, willingly or not.

Say no to biometrics. It's like having a password you can never change.

[–] [email protected] 18 points 6 months ago (1 children)

So, it really depends on your personal threat model.

For background: the biometric data doesn't leave the device, it uses an on-device recognition system to either unlock the device, or to gain access to a hardware security module that uses very strong cryptography for authentication.

Most people aren't defending against an attacker who has access to them and their device at the same time, they're defending against someone who has either the device or neither.

The hardware security module effectively eliminates the remote attacker when used with either biometric or PIN.
For the stolen or lost phone attack, biometric is slightly more secure, but it's moot because of the pin existing for fallback.

The biggest security advantage the biometrics have to offer is that they're very hard to forget, and very easy to use.
Ease of use means more people are likely to adopt the security features using that hardware security module provides, and that's what's really dialing up the security.

Passwords are most people's biggest vulnerability.

[–] [email protected] -2 points 6 months ago (2 children)

I've read all this before. If you believe the people who designed and implemented the device and its myriad layers of firmware and software were 1. All acting in good faith and 2. Knew WTF they were doing... then: yes, sure.

Unfortunately that's way too many strangers for me. Hundreds of people design and code these things. Meanwhile, every week there's a clever new breach somewhere.

[–] [email protected] 6 points 6 months ago (1 children)

If you're that afraid if the people who build phones, why are you ok with using any device that can access the internet?

[–] [email protected] 0 points 6 months ago (2 children)

I like how being cautious with my biometric data is beung framed as irrational fear and paranoia. As if ID theft never happens.

[–] [email protected] 2 points 6 months ago

Using biometric data to unlock your phone does not make you more vulnerable to petty criminals.

[–] [email protected] 1 points 6 months ago* (last edited 6 months ago)

You should be more worried about your local doctor's office contracting some cheap-ass company to handle your data and ending up in a branch than being concerned about biometrics.

Or hell, Experian had that insane breach of basically everyone's information years ago. Biometrics are not the problem, it's smaller companies that you have to deal with all the time skimping on security because they think they can't afford it.

And then companies even more shady than Google and Apple and Samsung (loan companies, health systems contractors, banks, credit card companies, insurance companies) have all your data and are more likely to be involved in a data breach.

[–] [email protected] 6 points 6 months ago (1 children)

While I do respect that viewpoint, there's a lot more independent scrutiny of the hardware modules than there are around the parts that would handle any other authentication mechanism you might use.

Pixel phone example iPhone example

Just because something isn't perfect doesn't mean we should keep using the less good thing that it replaces.

Use the PIN if that's more your cup of tea, just so long as you move away from passwords, since it's the HSM that's the protection, not the biometrics. Those are just to make it easier than passwords.

[–] [email protected] 0 points 6 months ago (1 children)

You can change PINs and passwords, but you cannot change your biometric data.

It's about as smart as using your SSN as your username.

[–] [email protected] 3 points 6 months ago

The point being that most people do not need to ever change their biometric data, because it isn't used for remote authentication.

It's about picking the right threat model, and for most people anything that gets them using the HSM is an improvement to their security.

[–] [email protected] 4 points 6 months ago (2 children)

it’s not a password; it’s closer to a username.

but realistically it’s not in my personal threat model to be ready to get tied down and forced to unlock my phone. everyone with windows on their house should know that security is mostly about how far an adversary is willing to go to try to steal from you.

personally, i like the natural daylight, and i’m not paranoid enough to brick up my windows just because it’s a potential ingress.

[–] [email protected] 2 points 6 months ago

That's why I put Linux on my house.

[–] [email protected] 0 points 6 months ago (1 children)

It's not a great analogy. Your house and its windows are exposed to your neighborhood/community. Your internet device is adjacent to every hacker on the web.

[–] [email protected] 2 points 6 months ago (1 children)

it’s an analogy that applies to me. tldr worrying about having my identity stolen via physical access to my phone isn’t part of my threat model. i live in a safe city, and i don’t have anything the police could find to incriminate me. everyone is going to have a different threat model. some people need to brick up their windows

[–] [email protected] -1 points 6 months ago (1 children)

Assuming the phone's security works as intended, what you're saying is true. However, it's a legit concern that the security is not airtight, and physical access is not actually required to harvest your biometric data.

I know the phone manufacturers make all sorts of claims about how secure biometric data is, but they have a profit motive to do so. I'm not being brick-up-my-windows paranoid by pointing out all the security failures and breaches we've seen over the years. Companies that have billions on the line are still frequently falling short at securing their own assets, much less their customer's data.

I understand biometrics are convenient, and many folks love the ease / coolness factor of using them. Just don't kid yourself that it's secure by requiring your physical phone. Once the dark web has a digital copy of your biometric data, it's compromised forever.

[–] [email protected] 0 points 6 months ago (1 children)

First provide proof that you can pull out biometric data out of a secure element in a phone.

[–] [email protected] 0 points 6 months ago* (last edited 1 month ago) (1 children)
[–] [email protected] 2 points 6 months ago (1 children)

That's not retrieving the biometric data from the device, that's retrieving the biometric data from surveillance or physical interaction.
It's quite specifically the type of threat that most people do not need to worry about.

[–] [email protected] 1 points 6 months ago (1 children)
[–] [email protected] 3 points 6 months ago

That's a much better example.

Physical access to the device by a sophisticated attacker is well outside the realm of most people's risk profile.

[–] [email protected] 4 points 6 months ago (1 children)

Password you can never change

Not with that attitude! You can absolutely change your face. its rather inadvisable

[–] [email protected] 3 points 6 months ago (1 children)
[–] [email protected] 5 points 6 months ago* (last edited 6 months ago)
[–] [email protected] 2 points 6 months ago

Same here. Still using the pattern lock. I've never used fingerprint not to even mention face scan.