• @stom
    link
    English
    4536 months ago

    This is why I use Linux, the fingerprint device wouldn’t be supported so this wouldn’t be an issue /s

    • @[email protected]
      link
      fedilink
      English
      1456 months ago

      Mmm yes security by non-functionality. A pillar of the modern cybersecurity framework.

        • @AbidanYre
          link
          English
          726 months ago

          But you can use a brick to hack windows.

          • fmstrat
            link
            fedilink
            English
            66 months ago

            When you could have said crack, but instead said hack.

          • @demonsword
            link
            English
            56 months ago

            But you can use a brick to hack windows

            yes indeed, the good ol’ broken windows fallacy!

        • @agent_flounder
          link
          English
          176 months ago

          And this is why I am typing this on a 1921 Royal No. 10 typewriter.

          • @AbidanYre
            link
            English
            96 months ago

            Found Tom Hanks’s Lemmy account.

      • @[email protected]
        link
        fedilink
        English
        406 months ago

        Works for my webcam. Tbh I’d like someone to hack it, would mean they would’ve written drivers for it

      • @Zeth0s
        link
        English
        176 months ago

        It is called zero trust, killing functionalities is zscaler core business

    • Cethin
      link
      fedilink
      English
      266 months ago

      The fun thing about Linux is your realize physical control is ownership. You can just throw a Bootable Linux image with some utilities and remove the password from a Windows account in a second. If you really need to keep something safe, it has to be encrypted.

      • @kadu
        link
        English
        146 months ago

        deleted by creator

        • @[email protected]
          link
          fedilink
          English
          -46 months ago

          Regardless, you can just read what’s on the disk anyway, so you don’t need to be able to log in.

          • @[email protected]
            link
            fedilink
            English
            -5
            edit-2
            6 months ago

            Unless bitlocker is enabled by default, which is becoming more and more common unfortunately…

            • @kadu
              link
              English
              216 months ago

              deleted by creator

      • smoothbrain coldtakes
        link
        fedilink
        English
        8
        edit-2
        6 months ago

        I got a T80s and the sensor doesn’t work. It’s an 8th gen Intel machine, that’s like four or five generations behind.

        • @[email protected]
          link
          fedilink
          English
          66 months ago

          I’ve got a T440p and I just set it up through the menu in the KDE settings, it worked right out of the box.

          • smoothbrain coldtakes
            link
            fedilink
            English
            3
            edit-2
            6 months ago

            Mine’s not in libfprint, libfprint-tod, or libfprint-goodix. Running GNOME because I heard fprintd was easier to implement instead of KDE, which is usually my pref DE.

    • /home/pineapplelover
      link
      fedilink
      English
      226 months ago

      Nah I use fprint on my arch laptop so there is fingerprint login technology. Hopefully that doesn’t have security vulnerabilities.

      • @[email protected]
        link
        fedilink
        English
        46 months ago

        It has vulnerabilities for sure. But they haven’t been found because no one cares about hacking you or the 1 other person on earth that use Arch and fingerprint security.

    • @RFBurns
      link
      English
      126 months ago

      Correct answer.

      Using any form of biometric ‘login’ under the US’s “justice” system is supremely ill-advised.

    • @[email protected]
      link
      fedilink
      English
      116 months ago

      That’s funny, on my XPS Windows crashed when I tried adding a fingerprint. Works flawlessly under Arch.

    • @[email protected]
      link
      fedilink
      English
      106 months ago

      Today I was fucking around with this shit. I can’t even update my distro, otherwise ecryptfs will go adios, and fingerprinting will be broken.

    • @ultranaut
      link
      English
      26 months ago

      One of the major reasons I gave up on trying to run Linux on my laptop was lack of fingerprint reader support.

      • El Barto
        link
        English
        166 months ago

        That would be a plus for me, actually. I never liked fingerprint authentication.

        • @Treczoks
          link
          English
          66 months ago

          So YES, from someone who was asked to do fingerprint authentication in a sensitive environment (and had to refuse, even to the salespeople pested me)

        • @regbin_
          link
          English
          26 months ago

          You can choose not to use it even if Linux supports it.

          • El Barto
            link
            English
            16 months ago

            Yup. I know that.

            • @regbin_
              link
              English
              16 months ago

              Then I really don’t see how it’s a plus. Smaller kernel size? lol

              • El Barto
                link
                English
                16 months ago

                The plus is that I don’t even need to think about it.

                My phone tries to trick me to enable fingerprint authentication every few months. My laptop? Perfection.

        • robotica
          link
          English
          -36 months ago

          How is not having support for something a plus for you? I swear to god, some Linux users are so stuck up.

          • El Barto
            link
            English
            10
            edit-2
            6 months ago

            Where to start…

            My dumb TV doesn’t support smart features. A plus.

            My coffee maker doesn’t support wifi. A plus.

            My games don’t support in-app purchases. A plus.

            My windows 10 laptop (did you read that?! Whaaat, I’m not a Linux user???!!!) doesn’t support Windows 11. Major plus.

            My MacBook’s OS version (no way!!!) doesn’t support unnecessary FaceTime features. A plus.

            • @smort
              link
              English
              36 months ago

              What TV did you get that doesn’t have smart features?

              I looked, but all the ones I could find were 1080p, no HDR, and either tiny or made for commercial/industrial installation.

              • El Barto
                link
                English
                56 months ago

                I got a Sceptre one a few years ago. Okay quality, terrible speakers (though an external soundbar takes care of that.)

          • @[email protected]
            link
            fedilink
            English
            46 months ago

            “what, you dont want to use the new door lock made from soggy white bread? You deadbolt losers are so stuck up”

          • @[email protected]
            link
            fedilink
            English
            36 months ago

            fingerprint login is not secure. period. Being stuck in using a password login is a plus

            • Alex
              link
              fedilink
              English
              36 months ago

              You could just disable fingerprint login, though.

              • El Barto
                link
                English
                36 months ago

                Sure, but that’s not the point of the conversation. The point is that some stranger is judging a whole community for the preference of one single person who may or may not belong to said community.

  • ChaoticNeutralCzech
    link
    fedilink
    English
    1046 months ago

    It stopped working when I uninstalled Edge, and so did the face recognition. So it depends on WebView or some shit. Pretty sure it’s Microsoft’s way of getting around the new EU regulations and hastily integrating the browser into everything, regardless of it making sense or improving security. like they did with 98 after the browser anti-competitiveness lawsuit.

    • /home/pineapplelover
      link
      fedilink
      English
      43
      edit-2
      6 months ago

      Wtf. It shouldn’t even need those permissions. All it needs to do is scan if the fingerprint it stores matches you.

      • @TORFdot0
        link
        English
        266 months ago

        It uses web view for web authentication for registering your Hello PIN to your Microsoft account. So it’s by design on Microsoft’s end. You can then use the Windows Hello credential as a passkey but if you don’t want that, you’d need another solution for biometric auth.

        • ChaoticNeutralCzech
          link
          fedilink
          English
          66 months ago

          Still, that does not explain the Edge dependency. Lots of programs can communicate with their respective servers without browser technology.

          • Unaware7013
            link
            fedilink
            86 months ago

            It kinda does though, if you look at it from a speed/competency aspect. I’m more and more convinced that the people who build out features only have tangential ideas on how it integrates into the overall system, so just throwing a browser at every problem gets you a cookie cutter backend with APIs and let’s you shove half baked features out the door without having to figure out how to wrap data in protocols since you just hand your payload so the browser and wait for a response.

      • @Wooki
        link
        English
        -1
        edit-2
        6 months ago

        Oh sweet summer child. No. That would have been the intelligent approach. It could have been fast and secure but it wouldn’t have had all that delicious telemetry nor taken another step towards charging you rent just to use your computer.

        They locked it behind two online services. Welcome to the new Microsoft. If it doesn’t include charging you rent or using you & your private information to train a large ai model. They don’t care.

    • @pycorax
      link
      English
      156 months ago

      hastily integrating the browser into everything, regardless of it making sense

      So software development in general in the last couple of years?

  • @[email protected]
    link
    fedilink
    English
    1046 months ago

    Reading the article it doesn’t sound like it’s Microsoft’s issue but the vendor’s implementation and lack of using the secure communication protocol.

    • @killeronthecorner
      link
      English
      366 months ago

      “vendors implementation” rings immediate alarm bells…

    • Corhen
      link
      English
      176 months ago

      it sounds like microsoft’s own laptops dont implement the spec properly!

      • @Aux
        link
        English
        176 months ago

        Microsoft doesn’t make fingerprint readers.

        • Corhen
          link
          English
          136 months ago

          Yea, but they sourced the parts from a vendor, and still didn’t make sure the vendor was properly following the spec.

          Just goes to show how complicated it can be!

          • @mint_tamas
            link
            English
            156 months ago

            Not sure why you being downvoted, one of the three laptops they cracked was a Surface. Of course Microsoft doesn’t “make it” but very few tech brands actually manufacture the hardware. By the way the Surface was sufficiently different in its design from the others that hints it’s a custom build anyway, not just an off label hardware with Microsoft stamped on it.

        • @Wooki
          link
          English
          -26 months ago

          Sounds like Microsoft doesn’t make anything

  • @[email protected]
    link
    fedilink
    English
    36
    edit-2
    6 months ago

    Stop using biometrics for authentication!!!

    Edit: lots of opinions below. Biometrics are a username, a thing you are. Finger printed can be taken from your laptop with a little powder and masking tape.

    Use an authentacator app or security key kids!!

    • @TORFdot0
      link
      English
      256 months ago

      Better put would be stop using biometrics for single factor authentication. A token can be stolen, or a passcode/push notification can be phished/bypassed as easy as biometrics can.

      • @[email protected]
        link
        fedilink
        English
        116 months ago

        Biometrics are two factor, because you need the fingerprint and the device they unlock.

        You can’t use the device without the fingerprint and you can’t take someone’s fingerprint then use them from a different device.

        • @[email protected]
          link
          fedilink
          English
          116 months ago

          You are not wrong, but you we should understand what class of attacks we are protecting against. Will biometrics stop your maid from using your device? Probably less. Will it stop the FBI? Not so sure.

          Now, you may say, an FBI raid is not what you worry about on a daily basis. Agree.

          If you are trying to keep the photos on your device safe from snooping, your good. Attacker needs the device and your fingerprint.

          When we talk online accounts, I’d count device+fingerprint as one factor. Sure, the maid from the example above can’t login into your gmail without your fingerprint, but most attacks are online. Your device sends a token to gmail, a cookie, a String; that’s like a password. One factor.

          Technically, it’s slightly better than a password, because this token can be short-lived (although often it’s not), could be cryptographic signature to be used exactly once (although…), you cannot brute-force guess the token… But IF the token leaks, the attacker has full access (or enough to cause damage).

          That’s why I would suggest an independent second factor, such as password. Yes, a password. Not for your daily routine (biometrics+device is much better), but maybe for high-risk operations.

          • @[email protected]
            link
            fedilink
            English
            9
            edit-2
            6 months ago

            Will biometrics stop your maid from using your device? Probably less. Will it stop the FBI? Not so sure.

            A sufficiently motivated maid will be able to do it. The FBI eats that kind of stuff for breakfast.

            Once upon a time, the then German minister of the interior wanted to collect all kinds of biometric data, in passports, in fully connected databases, whatnot. The CCC went ahead and swiped his print off a glass at a reception and published a DIY version to impersonate him in their magazine. Fingerprint authorisation is the security equivalent of a sticky note with your password on your coffee mug.

            The good news? You can use ordinary gloves, no need for tinfoil.

          • @[email protected]
            link
            fedilink
            English
            4
            edit-2
            6 months ago

            No, wrong. Still two factor because your fingerprint plus your device.

            These authentication methods aren’t as simple as the two factor Google Authenticator 6 digit number. They are cryptographically secure keys. Even if someone finds out what the token is, they still cannot send a valid request because they cannot generate a digitally signed request using the private key locked in your device’s hardware, unlocked by your biometrics.

            Passwords are inherently insecure and relatively easy to break. Digital signatures and secure tokens are almost unbreakable

        • @TORFdot0
          link
          English
          46 months ago

          You’re right. By most definitions of MFA biometrics would pass. A biometric is something you are, and the device is something you have. My comment is more for privacy zealous people, who are concerned that they could be compromised by governments without a “something you know” component.

    • Name is Optional
      link
      English
      206 months ago

      In Doom I had to rip off a dudes arm to gain access to the security controls on core cooling shutdown. If you don’t want to lose an arm to stop a demon horde, you’re better off just using your girlfriend’s fingerprints

        • Name is Optional
          link
          English
          46 months ago

          No… I get it totally. That why I know my girl’s worth my time, she’s willing to potentially give up her arm for me to still play DOOM 8 days a week

    • @[email protected]
      link
      fedilink
      English
      6
      edit-2
      6 months ago

      A username is not something “you are”, it’s something “you know”. Biometrics are not nearly the same as usernames.

      • @[email protected]
        link
        fedilink
        English
        16 months ago

        A username is something you are. It’s you! You are 0xD.
        A password is something you know. A security key is something you have.

        When we interview security analysts you don’t get past the first round if you disagree.

        • @feddylemmy
          link
          English
          86 months ago

          If your interview involves telling me a username is “something you are” rather than “something you know”, I’m running away from that job as fast as I can.

            • @[email protected]
              link
              fedilink
              English
              26 months ago

              I guarantee you I know thousands of people’s passwords as well, I just don’t know the username associated.

            • @sirfancy
              link
              English
              06 months ago

              By this same logic, other people could know your fingerprint since it’s “something you are”. No, other people cannot know your fingerprint. It’s a complex mathematical equation to a computer. This is such a terrible take.

              Source: CASP+ certified.

        • @[email protected]
          link
          fedilink
          English
          46 months ago

          No, this username is one of the names I’ve chosen for the accounts I use on lemmy. It does not identify me, it identifies the lemmy accounts that I just so happen to know the password for. I was just about to create an account with your username on another instance but meh, that’s too much work. Just imagine me having done that and think about what you just wrote.

          I would be vary of the people agreeing with you on something so basic yet so wrong.

          An authentication factor is a unique identifier that shows that you possess something that others don’t. Biometrics are something you are because your fingerprints, your retinas, or your DNA are (mostly) unique to you. A security key is something you have because unique cryptographic material is saved on the hardware device that cannot be replicated somewhere else (which is why many mobile authenticators really aren’t). And a password is something you know because… Bla bla bla.

          To be pedantic, a username is not a factor in this sense at all; It is an identifier for an account that you have to prove authorization for by presenting some kind of factor, sometimes multiple.

    • Rustmilian
      link
      English
      26 months ago

      Exactly, it’s fundamentally insecure.

      • @[email protected]
        link
        fedilink
        English
        31
        edit-2
        6 months ago

        As with all things security, it depends entirely on your thread model and the value of what you’re trying to protect.

        Biometrics can be a much more secure option than using a PIN or password, depending in circumstances.

        For example: when I’m working on my laptop on the train or in a coffee shop and I need to log into some website I’d rather use my fingerprint to unlock the passkey than type in a password in a public place where I have no idea who is observing me entering my password.

        Same goes for paying with your phone, you can either enter your phone PIN in a crowded supermarket or you unlock with FaceID.

        Also, for phones, for a lot of people the alternative to biometrics wouldn’t be a PIN, it would be no authentication whatsoever. Biometrics lowers the barrier to having a form of authentication at all.

        • Saik0
          link
          fedilink
          English
          -36 months ago

          for a lot of people the alternative to biometrics

          Full password Android user representing here… It’s surprising how few people bother to even stop any amount of snooping on their phones. but I guess it’s only surprising in that I wished more from society in general.

        • @seaQueue
          link
          English
          196 months ago

          Biometrics can be spoofed, or the body part stolen in extreme cases.

          Also, in the US at least, biometrics aren’t protected by the same rights that allow you to not incriminate yourself. IIRC they’re considered a thing you have, which you can be compelled to surrender or use to unlock a device, vs something you know (like a password or pattern) which you can withhold if it would be incriminating. Check with a lawyer on this one, I haven’t paid attention to the case law here for a bit.

          • @Squeak
            link
            English
            23
            edit-2
            6 months ago

            If someone is stealing my body parts, what they access on my devices is the least of my worries!

            • @wmassingham
              link
              English
              56 months ago

              They don’t have to be stolen. Imagine some clever thief drugging your drink, then when you’re incapacitated they take your phone and press your finger to it or hold it up to your face to unlock it, then transfer all your money out of Venmo or whatever money transfer app you have on your phone.

              • @Squeak
                link
                English
                66 months ago

                The comment I replied to said stolen, which is what I was getting at.

                There’s also nothing to stop someone watching over your shoulder to see your PIN for your phone/laptop. Nothing is infallible.

              • @jimbo
                link
                English
                0
                edit-2
                4 months ago

                deleted by creator

            • @[email protected]
              link
              fedilink
              English
              46 months ago

              Really? Would be up there for me. Sucks to miss a finger or eyeball, but if they’ve also drained my bank account and my credit card - I’m going to be even more pissed for sure.

        • @AbidanYre
          link
          English
          2
          edit-2
          6 months ago

          Ask OPM how they plan on getting my fingerprints back.

        • snooggums
          link
          fedilink
          18
          edit-2
          6 months ago

          If it is low detail enough to consistently ‘work’, it isn’t complex enough to be better than something like a chip and pin approach.

          They are repeatedly bypassed with easy hacks like silly putty and photographs. People’s biometrics are not unchanging. Burned fingers, swollen eyes, and sore throats are things that can change enough to make biosecurity unreliable. That is before cold and heat and how they effect biological things!

          That is all before you take into account the fact that some people don’t have whatever is being used. Have fun using eye based biosecurity on someone with cataracts or is missing their eyes entirely due to injury or just being born without them fully developed. Or they have a physical issue that makes it hard for them to interact with the bio reader. Stephen Hawking needing to lean towards a mounted eye scanner would be impossible for example.

          So either you have mediocre security that allows for a lot of false positives to get through or you end up having to add a bypass system for when it fails, and now you have two ways that security can be defeated! A non-biological solution with two factor authentication of an item and a PIN or other knowledge piece is far more secure than biosecurity can ever be.

          So already insecure, but in addition to that anyone with physical access to the person can force them to do the biosecurity. Police are able to force someone to put their finger on their phone, or look at the screen for a face unlock. Maybe they aren’t legally able to, but it is a good example of not being secure.

          • Rustmilian
            link
            English
            5
            edit-2
            6 months ago

            I couldn’t have said it better.

            Not to mention that a company could easily harvest this information, just look at FTC for example.

        • @TORFdot0
          link
          English
          36 months ago

          They aren’t 100% reliable and it has its’ challenges based on its implementation but I wouldn’t consider it fundamentally insecure. It’s as secure as a NFC token, TOTP, or a push notification as a form of authentication. It’s like birth control, no method is 100% safe and effective, but plain username and password auth is like pulling out, anything is better than that.

    • @[email protected]
      link
      fedilink
      English
      16 months ago

      Biometrics are perfectly fine! We probably don’t even live in the same country, I’m not going to get a hold of your fingerprints.

      There seems to be a fundamental misunderstanding of what the biometrics actually do. The biometrics only unlock the device and give access to the security key. Once unlocked it’s exactly the same as using a yubikey, and far better than an authenticator app, as they use a crypto key, not a 6 digit number.

      • @[email protected]
        link
        fedilink
        English
        26 months ago

        Well

        The biometrics only unlock the device

        Yes

        and give access to the security key

        This is the goal, sure, but what does this actually mean on device that’s mostly governed by software?

        There’s a chip (like a yubikey) in the device that can hold cryptographic keys.

        That’s good because the key cannot (easily) be extracted from the device.

        That’s good as long as no one has physical access to your device.

        With physical access, you hope that the device’s unlock mechanism is reasonably secure. That’s biometrics OR password/pin.

        The ‘or’ is the problem. For practical reasons you don’t want exactly one method hard-wired. You have a fingerprint scanner (good enough), the secure element (good enough) and lots of hard- and software in between (tricky).

        I’m not against biometrics (to unlock a device) because it’s convinient and much better than not locking the device at all. I’m also not against device trust (which you need if you want to store crypto keys sonewhere without separate hardware), but the convience of a single-device solution (laptop or phone) comes with a risk.

        If an attacker can bypass the unlock method or trick you into unlocking or compromise the device, your secrets are at risk. Having the key stored in the secure enclave (and not in a regular file on the hard disk) prevents copying the key material, but it does not prevent using the key when the attacker has some control over the (unlocked) device.

        A yubikey is more secure because it’s tiny and you can carry it on your keychain. The same chip inside your laptop is more likely to fall into the hands of an attacker.

      • @atrielienz
        link
        English
        76 months ago

        I have a lot of questions about what this guy thinks the rest of your device is covered in. Because spoiler, it’s fingerprints.

      • @[email protected]
        link
        fedilink
        English
        26 months ago

        Mine does not work at all. I’d like to see the guy trying to take fingerprints for a few hours and realizing it won’t do shit lol.

  • Flying Squid
    link
    English
    266 months ago

    Who is surprised? Are you surprised?

    • @n3m37h
      link
      English
      15
      edit-2
      6 months ago

      Removed by mod

      • Flying Squid
        link
        English
        106 months ago

        Pikachu is always surprised. And he doesn’t even speak or read English. So I was discounting him.

        • @n3m37h
          link
          English
          5
          edit-2
          6 months ago

          Removed by mod

  • @[email protected]
    link
    fedilink
    English
    106 months ago

    im all for the something you have + something you are , pb&j relationship, but i dont think lathering biometrics on top is a good idea,far too many spy movies have shown Tom Cruise doing the MOST for pictures of eyeballs and fingerprints for me to ever trust this type of auth

    • @[email protected]
      link
      fedilink
      English
      186 months ago

      The main issue with biometrics is that you can’t change them. If your fingerprints or retina are compromised you’re fucked.

        • Saik0
          link
          fedilink
          English
          96 months ago

          And yet, as a service member that was part of the 2013 OPM data breech, my finger prints (and an estimated 5.5 million other peoples) were part of the dataset that was stolen.

          So… What’s your point about “Global Internet”? If my data was stolen, and sent to the “Global Internet”(The fuck does this even mean?)… There’s no functional difference to an exposed password.

          • @[email protected]
            link
            fedilink
            English
            26 months ago

            My point is that I’m not worried about the relatively few people who could steal my fingerprint. I’m worried about the millions of people around the world who will try to steal my passwords and access my online accounts.

            If everyone secured their accounts with a biometrically secured security key, they would be far more secure than if they continue to just use a password.

            Tgose who go around spreading misinformed FUD over biometrics ensure people who don’t know better continue to use weak passwords.

            Even if someone gets your fingerprints from the OPM breach still can’t use them because they also need your phone. You are still protected from all of the hackers around the world.

            • Saik0
              link
              fedilink
              English
              16 months ago

              My point is that I’m not worried about the relatively few people who could steal my fingerprint.

              This group is much larger than you’re assuming.

              I’m worried about the millions of people around the world who will try to steal my passwords and access my online accounts.

              Bio doesn’t stop people from setting bad passwords.

              If everyone secured their accounts with a biometrically secured security key, they would be far more secure than if they continue to just use a password.

              Except you should know better than this… They will simply do BOTH. Set a terrible password because they will be required to make one from the get-go AND use bio. There is no service on the face of the planet that strictly accepts tokens from Bio tools. Simply using Bio doesn’t stop those online from bruteforcing the underlying password.

              Tgose who go around spreading misinformed FUD over biometrics ensure people who don’t know better continue to use weak passwords.

              No. I “Spread FUD” because I understand that a good password MUST be revocable. Which Bio CANNOT be. Bio is a username.

              Even if someone gets your fingerprints from the OPM breach still can’t use them because they also need your phone. You are still protected from all of the hackers around the world.

              No… I’m protected because I use functionally impossible passwords to break that are truly randomly generated and of sufficient length. Further to protect things I use a Yubikey, when supported. Further I use services that monitor breeches and actively change those affected passwords. Bio adds nothing to my protection and in my case (and the case of millions of other people) would actively hinder it.

              You have the premise backwards though. It’s now, if someone has your device at all… you cannot presume it to be capable of securing anything since your prints are likely on the device itself anyway, oops…

              • @[email protected]
                link
                fedilink
                English
                2
                edit-2
                6 months ago

                There is no service on the face of the planet that strictly accepts tokens from Bio tools. Simply using Bio doesn’t stop those online from bruteforcing the underlying password.

                https://support.microsoft.com/en-us/account-billing/how-to-go-passwordless-with-your-microsoft-account-674ce301-3574-4387-a93d-916751764c43

                https://blog.google/technology/safety-security/the-beginning-of-the-end-of-the-password/

                https://techcrunch.com/2022/09/12/apple-passkey/

                No. I “Spread FUD” because I understand that a good password MUST be revocable. Which Bio CANNOT be. Bio is a username.

                Incorrect because your bio is not the password, the private key is. The private key is revocable. Your bio just unlocks your hardware key store and makes the private key accessible to the software.

                This is what I mean when I say people do not understand biometric authentication.

                • Saik0
                  link
                  fedilink
                  English
                  1
                  edit-2
                  6 months ago

                  https://support.microsoft.com/en-us/account-billing/how-to-go-passwordless-with-your-microsoft-account-674ce301-3574-4387-a93d-916751764c43

                  Uh huh…

                  Once you remove your password from your account, you will need to sign in using a passwordless method like the Microsoft Authenticator app, Windows Hello, physical security keys, or SMS codes.

                  SMS

                  So which 2fa method do we NEVER ask users to use anymore? You know… because lying to a phone carrier and getting a new sim card sent to someone who isn’t on the account is the hardest thing in the world to do! Or cloning a sim card.

                  Windows Hello

                  Which just had some leaks about how insecure it is.

                  You’re going to have to do way better than this…

                  Regardless all three of these would then rely on your specific device to login, which MUST have a recovery method. Since you know… devices break, get reformatted, etc… What does that process look like? With a password… I simply change the password. Can you guarantee that I can revoke the key and replace it without having to buy new hardware?


                  https://techcrunch.com/2022/09/12/apple-passkey/

                  They sync shit using iCloud… The private key is not secure. I don’t care what your argument is if it’s in relation to apple. If you need further argument on this topic… Just look at all the leaked videos from Tesla cars. Big companies DO NOT DESERVE YOUR TRUST.


                  Incorrect because your bio is not the password, the private key is. The private key is revocable. Your bio just unlocks your hardware key store and makes the private key accessible to the software.

                  And you say I don’t have an understanding… It doesn’t matter how many keys deep you have to go. If the end of the line is an item that has been compromised, it DOESN’T MATTER how many steps you take after that. The compromised item is already obtained when you obtained the device.

                  Now… Can you tell me the process to revoke the private key from your fingerprint reader on your phone? You claim it’s revocable. Revoke it. Show me. I’ll wait. Can you prove that the blob in your phone is doing that? These chips are written once at the manufacturer with no oversight or validation. I’m not an idiot. I know your literal fingerprint isn’t sent up to the cloud. It’s used to tell a local chip to authenticate a public key against the private one contained within that typically never leaves the chip (except that the passkey standard actually allows key mobility, so it’s actually worse than the FIDO standard that it’s built upon). It’s a blob that you have no insight into and no control over.

                  If I were to bump into you, and lift your phone. I’d likely have your fingerprint just by lifting it off your phone and can sign into your phone. That’s it… It’s like you didn’t have a password at all because I simply HAVE it. I’ve found that theft is actually much greater risk in my life than my digital footprint. But that’s only because I can actually mitigate the digital stuff by not being retarded and putting everything into the internet. Theft on the other hand… Can’t do much about someone who willingly knocks me the fuck out (gasp! the XKCD comic strikes again!). But I can make sure that if they knock me the fuck out, they don’t just get to take my shit and unlock it without my brain remaining functional.

                  None of that even matters. This is a chain of trust that I can’t actually audit… So it’s worthless. This requires that I trust Google (android), Samsung(or other device manufacturer), their vendors(whoever makes the fingerprint reader), etc… You know who I have to to trust for my password? My password manager and myself. The fun part is that my password manager is actually audited… and opensource, AND I’ve looked at it enough to be happy with it. Who audited Windows Hello? https://www.theverge.com/2023/11/22/23972220/microsoft-windows-hello-fingerprint-authentication-bypass-security-vulnerability Ooops.

                  It’s funny, because you know what this does to authentication? It puts all the power into another companies hands… and takes ALL of it out of yours. Which is interesting that someone on Lemmy is gung-ho about this.

                  Let’s look at a real world example of something you might ACTUALLY have to do. You’re crossing the border into a country. You have data you really don’t want the government snooping into like hot nudes from your significant other. So you wipe your device before you cross the border to ensure the government can’t violate your rights. Oops, you no longer can access ANY account you own because you relied on that device to be what unlocks everything.

                  Also, whats more likely… that you break a device or that a user CANNOT learn how to use a password manager?

                  Edit: For shits and giggles I logged into my Google account to see what the passkey setup even looks like for them… Turns out that it’s automatically created keys for devices I’ve logged into… Including devices I don’t own anymore.

                  Really secure that is! Nothing screams security like creating methods to access my account without my fucking knowledge. What a joke.

        • @[email protected]
          link
          fedilink
          English
          76 months ago

          It doesn’t need to be physical breach. If it’s stored somewhere it can (and might) be accessed by someone else and reconstructed.

          • @[email protected]
            link
            fedilink
            English
            36 months ago

            And still useless unless they also steal your phone. You are still safe from the hackers on the other side of the planet

  • AutoTL;DRB
    link
    fedilink
    English
    106 months ago

    This is the best summary I could come up with:


    Microsoft’s Offensive Research and Security Engineering (MORSE) asked Blackwing Intelligence to evaluate the security of fingerprint sensors, and the researchers provided their findings in a presentation at Microsoft’s BlueHat conference in October.

    The team identified popular fingerprint sensors from Goodix, Synaptics, and ELAN as targets for their research, with a newly-published blog post detailing the in-depth process of building a USB device that can perform a man-in-the-middle (MitM) attack.

    Blackwing Intelligence researchers reverse engineered both software and hardware, and discovered cryptographic implementation flaws in a custom TLS on the Synaptics sensor.

    The complicated process to bypass Windows Hello also involved decoding and reimplementing proprietary protocols.

    The researchers found that Microsoft’s SDCP protection wasn’t enabled on two of the three devices they targeted.

    Blackwing Intelligence now recommends that OEMs make sure SDCP is enabled and ensure the fingerprint sensor implementation is audited by a qualified expert.


    The original article contains 474 words, the summary contains 145 words. Saved 69%. I’m a bot and I’m open source!

    • @[email protected]
      link
      fedilink
      English
      36 months ago

      … Did that say “custom implementation of TLS”?

      That’s like… The first rule of security. You don’t roll your own cryptographic implementation. Like, first you’re told that, then they tell you the difference between security and obscurity, say both those things in bold, and continue with whatever beginner topic

  • atocci
    link
    fedilink
    56 months ago

    The Surface Pro X has a fingerprint reader? Is it on the keyboard or something? Mine sure doesn’t have one.