You must log in or register to comment.
First provide proof that you can pull out biometric data out of a secure element in a phone.
That’s not retrieving the biometric data from the device, that’s retrieving the biometric data from surveillance or physical interaction.
It’s quite specifically the type of threat that most people do not need to worry about.That’s a much better example.
Physical access to the device by a sophisticated attacker is well outside the realm of most people’s risk profile.