On Tue, 12 Oct 2004, John Kelsey wrote:
> but there doesn't seem to be a clean process for determining how
> skilled an attacker needs to be to, say, scan my finger once, and
> produce either a fake finger or a machine for projecting a fake
> fingerprint into the reader.

... or a replacement reader that fakes the signals to the rest of the
security system.

--apb (Alan Barrett)

Reply via email to