• @[email protected]
    link
    fedilink
    English
    12 months ago

    This article is frustratingly light on the technical details of how thieves are bypassimg fingerprint security on stolen phones. Anyone have any sources?