You must log in or register to comment.
That’s not retrieving the biometric data from the device, that’s retrieving the biometric data from surveillance or physical interaction.
It’s quite specifically the type of threat that most people do not need to worry about.That’s a much better example.
Physical access to the device by a sophisticated attacker is well outside the realm of most people’s risk profile.