13 Oct
2004
13 Oct
'04
3:47 a.m.
On Tue, 12 Oct 2004, John Kelsey wrote:
but there doesn't seem to be a clean process for determining how skilled an attacker needs to be to, say, scan my finger once, and produce either a fake finger or a machine for projecting a fake fingerprint into the reader.
... or a replacement reader that fakes the signals to the rest of the security system. --apb (Alan Barrett)