• Be careful - they can lift a fingerprint off a digital photo

    From Mickey D@21:1/5 to All on Sun May 5 14:47:55 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Be careful - they can lift a fingerprint off a digital photo. https://ichef.bbci.co.uk/news/1024/cpsprodpb/07f9/live/65b1da70-07be-11ef-8533-c557f743cc78.png

    Says so here:

    From teenage cyber-thug to Europe¢s most wanted https://www.bbc.com/news/articles/cyxe9g4zlgpo

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?J=C3=B6rg_Lorenz?=@21:1/5 to Mickey D on Sun May 5 21:23:41 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 05.05.24 20:47, Mickey D wrote:
    Be careful - they can lift a fingerprint off a digital photo. https://ichef.bbci.co.uk/news/1024/cpsprodpb/07f9/live/65b1da70-07be-11ef-8533-c557f743cc78.png

    Says so here:

    From teenage cyber-thug to Europe’s most wanted https://www.bbc.com/news/articles/cyxe9g4zlgpo

    And this bizarre story has exactly what to do with iOS or Android?
    Completely OT here.

    --
    "Alea iacta est." (Julius Caesar)

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Oliver@21:1/5 to hugybear@gmx.net on Sun May 5 13:42:29 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On Sun, 5 May 2024 21:23:41 +0200, Jörg Lorenz <hugybear@gmx.net> wrote

    And this bizarre story has exactly what to do with iOS or Android?

    Where are most digital photos taken from?
    Maybe a phone or a webcam perhaps?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From R.Wieser@21:1/5 to All on Sun May 5 22:20:44 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Mickey,

    Be careful - they can lift a fingerprint off a digital photo.

    And thats just one of the more complex methods there are.

    You touch surfaces almost every day without even realizing it - hey, that is what hands and fingers are for, right ? - effectivily broadcasting that
    feature of yourself to everyone around you.

    Same goes for "faceprints". Even easier, as your faceprint can be "taken"
    from literally tens of meters away.

    To me whomever thought of using finger and faceprints for locks wasn't very bright.

    Regards,
    Rudy Wieser

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to All on Sun May 5 17:06:10 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-05 15:23, Jörg Lorenz wrote:
    On 05.05.24 20:47, Mickey D wrote:
    Be careful - they can lift a fingerprint off a digital photo.
    https://ichef.bbci.co.uk/news/1024/cpsprodpb/07f9/live/65b1da70-07be-11ef-8533-c557f743cc78.png

    Says so here:

    From teenage cyber-thug to Europe’s most wanted
    https://www.bbc.com/news/articles/cyxe9g4zlgpo

    And this bizarre story has exactly what to do with iOS or Android?
    Completely OT here.


    Interesting nonetheless and some connection to smart phones (they have
    cameras, after all - indeed more people use the camera than the "phone").

    Please note: We don't need you as net cop Jörg.


    --
    “Patriotism is when love of your own people comes first;
    nationalism, when hate for people other than your own comes first.â€
    - Charles de Gaulle.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to R.Wieser on Sun May 5 17:04:57 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-05 16:20, R.Wieser wrote:
    Mickey,

    Be careful - they can lift a fingerprint off a digital photo.

    And thats just one of the more complex methods there are.

    You touch surfaces almost every day without even realizing it - hey, that is what hands and fingers are for, right ? - effectivily broadcasting that feature of yourself to everyone around you.

    Same goes for "faceprints". Even easier, as your faceprint can be "taken" from literally tens of meters away.

    To me whomever thought of using finger and faceprints for locks wasn't very bright.

    Yet trying to unlock an iPhone with its owner's photo will not work and
    you have to go through a lot of contortions if you happen to have their fingerprint.

    --
    “Patriotism is when love of your own people comes first;
    nationalism, when hate for people other than your own comes first.â€
    - Charles de Gaulle.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Hank Rogers@21:1/5 to Alan Browne on Sun May 5 19:04:27 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Alan Browne wrote:
    On 2024-05-05 15:23, Jörg Lorenz wrote:
    On 05.05.24 20:47, Mickey D wrote:
    Be careful - they can lift a fingerprint off a digital photo.
    https://ichef.bbci.co.uk/news/1024/cpsprodpb/07f9/live/65b1da70-07be-11ef-8533-c557f743cc78.png


    Says so here:

     From teenage cyber-thug to Europe’s most wanted
    https://www.bbc.com/news/articles/cyxe9g4zlgpo

    And this bizarre story has exactly what to do with iOS or Android?
    Completely OT here.


    Interesting nonetheless and some connection to smart phones (they have cameras, after all - indeed more people use the camera than the "phone").

    Please note: We don't need you as net cop Jörg.


    Don't worry. I don't think he has arrest power, but he *is* the moderator
    here, so we should show him the due respect.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From WolfFan@21:1/5 to Hank Rogers on Sun May 5 21:49:12 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On May 5, 2024, Hank Rogers wrote
    (in article <v196qb$24t86$1@dont-email.me>):

    Alan Browne wrote:
    On 2024-05-05 15:23, Jörg Lorenz wrote:
    On 05.05.24 20:47, Mickey D wrote:
    Be careful - they can lift a fingerprint off a digital photo. https://ichef.bbci.co.uk/news/1024/cpsprodpb/07f9/live/65b1da70-07be-11ef-
    8533-c557f743cc78.png


    Says so here:

    From teenage cyber-thug to Europe’s most wanted https://www.bbc.com/news/articles/cyxe9g4zlgpo

    And this bizarre story has exactly what to do with iOS or Android? Completely OT here.


    Interesting nonetheless and some connection to smart phones (they have cameras, after all - indeed more people use the camera than the "phone").

    Please note: We don't need you as net cop Jörg.

    Don't worry. I don't think he has arrest power, but he *is* the moderator here,

    No, he isn’t.
    so we should show him the due respect.

    I show him all the respect that a trolling, sliming, stalking, serial homosexual sexual harasser deserves.

    Hey, David, you arsenugget, how goes your attempt to ‘report’ me to Supernews?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to WolfFan on Mon May 6 02:56:27 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-06, WolfFan <akwolffan@zoho.com> wrote:
    On May 5, 2024, WolfFan wrote
    (in article<0001HW.2BE86E980020D285700006E6738F@news.supernews.com>):

    On May 5, 2024, Hank Rogers wrote
    (in article <v196qb$24t86$1@dont-email.me>):

    Alan Browne wrote:
    On 2024-05-05 15:23, Jörg Lorenz wrote:
    On 05.05.24 20:47, Mickey D wrote:
    Be careful - they can lift a fingerprint off a digital photo.
    https://ichef.bbci.co.uk/news/1024/cpsprodpb/07f9/live/65b1da70-07be-11ef
    -
    8533-c557f743cc78.png


    Says so here:

    From teenage cyber-thug to Europe’s most wanted
    https://www.bbc.com/news/articles/cyxe9g4zlgpo

    And this bizarre story has exactly what to do with iOS or Android?
    Completely OT here.


    Interesting nonetheless and some connection to smart phones (they have >> > > cameras, after all - indeed more people use the camera than the "phone").

    Please note: We don't need you as net cop Jörg.

    Don't worry. I don't think he has arrest power, but he *is* the moderator >> > here,

    No, he isn’t.
    so we should show him the due respect.

    I show him all the respect that a trolling, sliming, stalking, serial
    homosexual sexual harasser deserves.

    Hey, David, you arsenugget, how goes your attempt to ‘report’ me to
    Supernews?

    Oops. it’s the other twit, Jorg, not the supertwit David. Jorg’s bad. He’s not David Brooks bad. Ignore that post, bad aim.

    I mean both are jackasses and neither one is a moderator on Usenet. So
    you weren't too far off the mark. 😉

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Uncle Sam@21:1/5 to Mickey D on Mon May 6 03:30:00 2024
    On 05/05/2024 19:47, Mickey D wrote:
    Be careful - they can lift a fingerprint off a digital photo. https://ichef.bbci.co.uk/news/1024/cpsprodpb/07f9/live/65b1da70-07be-11ef-8533-c557f743cc78.png

    Says so here:

    From teenage cyber-thug to Europe’s most wanted https://www.bbc.com/news/articles/cyxe9g4zlgpo
    You didn't understand the story. They got the fingerprints because he
    posted an image of his fingers online and this was compared with his
    fingers when he was in custody. That's how they proved that the anon
    chap is the same person they have got in their custody. So moral of the
    story is don't be stupid to post images of your body parts if you are
    going to commit any cyber crimes hoping to get away by being anonymous.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From WolfFan@21:1/5 to All on Sun May 5 22:30:16 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On May 5, 2024, WolfFan wrote
    (in article<0001HW.2BE86E980020D285700006E6738F@news.supernews.com>):

    On May 5, 2024, Hank Rogers wrote
    (in article <v196qb$24t86$1@dont-email.me>):

    Alan Browne wrote:
    On 2024-05-05 15:23, Jörg Lorenz wrote:
    On 05.05.24 20:47, Mickey D wrote:
    Be careful - they can lift a fingerprint off a digital photo. https://ichef.bbci.co.uk/news/1024/cpsprodpb/07f9/live/65b1da70-07be-11ef
    -
    8533-c557f743cc78.png


    Says so here:

    From teenage cyber-thug to Europe’s most wanted https://www.bbc.com/news/articles/cyxe9g4zlgpo

    And this bizarre story has exactly what to do with iOS or Android? Completely OT here.


    Interesting nonetheless and some connection to smart phones (they have cameras, after all - indeed more people use the camera than the "phone").

    Please note: We don't need you as net cop Jörg.

    Don't worry. I don't think he has arrest power, but he *is* the moderator here,

    No, he isn’t.
    so we should show him the due respect.

    I show him all the respect that a trolling, sliming, stalking, serial homosexual sexual harasser deserves.

    Hey, David, you arsenugget, how goes your attempt to ‘report’ me to Supernews?

    Oops. it’s the other twit, Jorg, not the supertwit David. Jorg’s bad. He’s not David Brooks bad. Ignore that post, bad aim.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mickey D@21:1/5 to Uncle Sam on Mon May 6 02:09:20 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On Mon, 6 May 2024 03:30:00 +0000, Uncle Sam wrote:

    On 05/05/2024 19:47, Mickey D wrote:
    Be careful - they can lift a fingerprint off a digital photo.
    https://ichef.bbci.co.uk/news/1024/cpsprodpb/07f9/live/65b1da70-07be-11ef-8533-c557f743cc78.png

    Says so here:

    From teenage cyber-thug to Europe¢s most wanted
    https://www.bbc.com/news/articles/cyxe9g4zlgpo

    They got the fingerprints because he
    posted an image of his fingers online and this was compared with his
    fingers when he was in custody. That's how they proved that the anon
    chap is the same person they have got in their custody. So moral of the
    story is don't be stupid to post images of your body parts if you are
    going to commit any cyber crimes hoping to get away by being anonymous.

    Thank you for explaining the story for those who haven't read it yet.

    What's not in that story is that they can also often identify which camera
    an original photo came from (which means they can cross correlate photos
    that you post to various sites on the net if they want to do that).

    That is, if you post a photo to forum 1 and another photo to forum 2, in
    some cases they can correlate the sensor fingerprint to your unique camera.

    Just to be clear, I'm not talking about metadata as sensor fingerprints
    work for all photo formats - as the forensics identify the camera through unique repetitive imperfections in each camera sensor's digital output. https://theconversation.com/explainer-how-law-enforcement-decodes-your-photos-78828

    https://www.spiedigitallibrary.org/conference-proceedings-of-spie/7254/1/Large-scale-test-of-sensor-fingerprint-camera-identification/10.1117/12.805701.short
    "This paper presents a large scale test of camera identification
    from sensor fingerprints."

    However, if you modify that original image substantially, their forensics
    are increasingly less than perfect depending on how well you modify them.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From R.Wieser@21:1/5 to All on Mon May 6 09:04:57 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Alan,

    Yet trying to unlock an iPhone with its owner's photo will not work

    They said the same about fingerprints. Yet, here we are ...

    The point is not about how easy it (now!) is to reproduce something like
    that, but that anyone can "take" from you what's supposed to be only yours.

    and you have to go through a lot of contortions if you happen to have
    their fingerprint.

    As long as you don't need the owner of said fingerprints to be present, who cares ?

    And do yourself a favour and look up some YouTube stuff about "hacking" fingerprint locks. You might be surprised how easy some of them are fooled.

    Yes, yes. IPhone fingerprint locks are superior and noone can bypass them.
    Go pull my other finger.

    Regards,
    Rudy Wieser

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Arno Welzel@21:1/5 to All on Mon May 6 10:04:37 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    R.Wieser, 2024-05-05 22:20:

    Mickey,

    Be careful - they can lift a fingerprint off a digital photo.

    And thats just one of the more complex methods there are.

    You touch surfaces almost every day without even realizing it - hey, that is what hands and fingers are for, right ? - effectivily broadcasting that feature of yourself to everyone around you.

    Same goes for "faceprints". Even easier, as your faceprint can be "taken" from literally tens of meters away.

    Except that unlocking with your face in iOS is *not* only using an image
    of your face but also the three dimensional shape of it. That's the
    reason why the "notch" in the iPhone displays is bigger since there is
    not only a camera but also a 3D sensor to capture the shape of your face.

    To me whomever thought of using finger and faceprints for locks wasn't very bright.

    Yes, in Android using *images* of a face to unlock a phone is indeed not
    a good idea.

    --
    Arno Welzel
    https://arnowelzel.de

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Carlos E.R.@21:1/5 to Arno Welzel on Mon May 6 10:23:26 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-06 10:04, Arno Welzel wrote:
    R.Wieser, 2024-05-05 22:20:

    Mickey,

    Be careful - they can lift a fingerprint off a digital photo.

    And thats just one of the more complex methods there are.

    You touch surfaces almost every day without even realizing it - hey, that is >> what hands and fingers are for, right ? - effectivily broadcasting that
    feature of yourself to everyone around you.

    Same goes for "faceprints". Even easier, as your faceprint can be "taken" >> from literally tens of meters away.

    Except that unlocking with your face in iOS is *not* only using an image
    of your face but also the three dimensional shape of it. That's the
    reason why the "notch" in the iPhone displays is bigger since there is
    not only a camera but also a 3D sensor to capture the shape of your face.

    What is a "3D sensor" actually? :-)

    --
    Cheers, Carlos.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andrew@21:1/5 to R.Wieser on Mon May 6 08:16:12 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    R.Wieser wrote on Mon, 6 May 2024 09:04:57 +0200 :

    Yet trying to unlock an iPhone with its owner's photo will not work

    They said the same about fingerprints. Yet, here we are ...

    The point is not about how easy it (now!) is to reproduce something like that, but that anyone can "take" from you what's supposed to be only yours.

    and you have to go through a lot of contortions if you happen to have
    their fingerprint.

    As long as you don't need the owner of said fingerprints to be present, who cares ?

    And do yourself a favour and look up some YouTube stuff about "hacking" fingerprint locks. You might be surprised how easy some of them are fooled.

    Yes, yes. IPhone fingerprint locks are superior and noone can bypass them. Go pull my other finger.

    Fingerprint biometric unlocks on most phones are only a marketing gimmick.

    Mainly you'll see the Apple religious nutjob zealots defending its use.

    That's because Apple zealots always believe everything Apple tells them to. Apple religious nutjob zealots have no capacity to think on their own.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From R.Wieser@21:1/5 to All on Mon May 6 11:51:27 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Arno,

    Except that unlocking with your face in iOS is *not* only using an image
    of your face but also the three dimensional shape of it.

    Yes, and ? 3D printers exist.

    And thats the buget solution. People who created 3D heads (and full body representations) have existed since *forever* - statues anyone? And as a
    more contemporary example just take a look at Madame Tussauds in New York.
    (and others like it).

    Yes, in Android using *images* of a face to unlock a phone is indeed
    not a good idea.

    Its a *very good* idea. It should *not ever* happen though. :-)

    Coming up with a new locking mechanism (mechanical or software) isn't all
    that hard. What is is to make sure that only the key designed for it can actually open it.

    If you want to see examples of how locks, even expensive ones, can be
    bypassed with the proverbial paperclip I would like to refer you to the "Lockpicking Lawyer" clips on YouTube. Those are enlighting.

    Regards,
    Rudy Wieser

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mickey D@21:1/5 to Chris on Mon May 6 07:56:00 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On Mon, 6 May 2024 12:10:07 +0100, Chris wrote:

    Be careful - they can lift a fingerprint off a digital photo.
    https://ichef.bbci.co.uk/news/1024/cpsprodpb/07f9/live/65b1da70-07be-11ef-8533-c557f743cc78.png

    Says so here:

    From teenage cyber-thug to Europe¢s most wanted
    https://www.bbc.com/news/articles/cyxe9g4zlgpo

    They got the fingerprints because he
    posted an image of his fingers online and this was compared with his
    fingers when he was in custody. That's how they proved that the anon
    chap is the same person they have got in their custody. So moral of the
    story is don't be stupid to post images of your body parts if you are
    going to commit any cyber crimes hoping to get away by being anonymous.

    Thank you for explaining the story for those who haven't read it yet.

    What's not in that story is that they can also often identify which camera >> an original photo came from (which means they can cross correlate photos
    that you post to various sites on the net if they want to do that).

    That is, if you post a photo to forum 1 and another photo to forum 2, in
    some cases they can correlate the sensor fingerprint to your unique camera.

    Not quite. Last I looked at this, which was a few years ago now, it was limited to the make and model of the camera. Not the capability to
    identify your particular camera. e.g. https://www.tandfonline.com/doi/full/10.1080/24751839.2022.2058252

    This is of limited utility as I imagine 95% of photos are taken by
    iphones, galaxys and pixels. Plus the sensors are commodity items which
    are shared between models.

    Just to be clear, I'm not talking about metadata as sensor fingerprints
    work for all photo formats - as the forensics identify the camera through
    unique repetitive imperfections in each camera sensor's digital output.
    https://theconversation.com/explainer-how-law-enforcement-decodes-your-photos-78828

    https://www.spiedigitallibrary.org/conference-proceedings-of-spie/7254/1/Large-scale-test-of-sensor-fingerprint-camera-identification/10.1117/12.805701.short
    "This paper presents a large scale test of camera identification
    from sensor fingerprints."

    This is quite an old reference.

    However, if you modify that original image substantially, their forensics
    are increasingly less than perfect depending on how well you modify them.

    You misunderstood. It's all about identifying the EXACT camera.

    There are many forensic techniques which take advantage of the unique
    errors inherent in any camera sensor, all of which improve over time. https://www.mdpi.com/2313-433X/10/2/31

    There are even companies that sell this software already. https://www.mobiledit.com/camera-ballistics

    Don't ask me how they do it though as it uses sophisticated math.

    There are articles out there on how to defeat it if you care to look. https://duckduckgo.com/&q=how+to+defeat+camera+photo+forensics

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to Carlos E.R. on Mon May 6 10:59:27 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-06 04:23, Carlos E.R. wrote:
    On 2024-05-06 10:04, Arno Welzel wrote:
    R.Wieser, 2024-05-05 22:20:

    Mickey,

    Be careful - they can lift a fingerprint off a digital photo.

    And thats just one of the more complex methods there are.

    You touch surfaces almost every day without even realizing it - hey,
    that is
    what hands and fingers are for, right ? - effectivily broadcasting that
    feature of yourself to everyone around you.

    Same goes for "faceprints".  Even easier, as your faceprint can be
    "taken"
    from literally tens of meters away.

    Except that unlocking with your face in iOS is *not* only using an image
    of your face but also the three dimensional shape of it. That's the
    reason why the "notch" in the iPhone displays is bigger since there is
    not only a camera but also a 3D sensor to capture the shape of your face.

    What is a "3D sensor" actually?  :-)

    In the case of iPhone the 'shape' of the face is determined as described
    here:

    https://support.apple.com/en-ca/102381

    The term Apple uses is "depth map of your face"

    Further: "and also captures an infrared image of your face."

    --
    “Patriotism is when love of your own people comes first;
    nationalism, when hate for people other than your own comes first.â€
    - Charles de Gaulle.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to R.Wieser on Mon May 6 10:54:23 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-06 03:04, R.Wieser wrote:

    And do yourself a favour and look up some YouTube stuff about "hacking" fingerprint locks. You might be surprised how easy some of them are fooled.

    Easy when presented as a YT video. Not many people will actually:

    - lift the print from something
    - make the 'fake' print
    - get access to the physical phone or other device
    - get in

    --
    “Patriotism is when love of your own people comes first;
    nationalism, when hate for people other than your own comes first.â€
    - Charles de Gaulle.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to R.Wieser on Mon May 6 11:02:13 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-06 05:51, R.Wieser wrote:
    Arno,

    Except that unlocking with your face in iOS is *not* only using an image
    of your face but also the three dimensional shape of it.

    Yes, and ? 3D printers exist.

    That also express the thermal (IR) "print" that FaceID is looking for?


    --
    “Patriotism is when love of your own people comes first;
    nationalism, when hate for people other than your own comes first.â€
    - Charles de Gaulle.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From R.Wieser@21:1/5 to All on Mon May 6 18:55:42 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Alan,

    And do yourself a favour and look up some YouTube stuff about "hacking"
    fingerprint locks. You might be surprised how easy some of them are
    fooled.

    Easy when presented as a YT video.

    Yes, its always looks easy when its done by someone who knows he's doing.
    On a YT video or IRL.

    Not many people will actually:

    - lift the print from something
    - make the 'fake' print
    - get access to the physical phone or other device
    - get in

    Not many people wil break into houses. Yet, you have a lock on your outside doors. Your point ?

    But now you have acknowledged its possible, all we would be discussing about
    is how easy/hard it would be. Thats a large step forward, padawan. :-)

    Regards,
    Rudy Wieser

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From R.Wieser@21:1/5 to All on Mon May 6 19:10:47 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Chris,

    And as a more contemporary example just take a look at Madame Tussauds
    in New York. (and others like it).

    They are universally shit. I don't understand how waxworks museums are
    still a thing. I'm sure they were amazing in Victorian times.

    Well, I do seem to remember when a certain actor took the place of his wax counterpart. The people walking by didn't even notice his different
    appearance from the wax puppets next to him.

    Always funny to see people jump when such a "wax figure" suddenly comes to life. :-)

    Also, its not how such wax figures look exactly like the person they are supposed to represent, its about the possibility of creating a
    topographically close enough faximile of a persons head. You know, for
    those face-ID scanners

    Regards,
    Rudy Wieser

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From R.Wieser@21:1/5 to All on Mon May 6 19:03:41 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Alan,

    Except that unlocking with your face in iOS is *not* only using an image >>> of your face but also the three dimensional shape of it.

    Yes, and ? 3D printers exist.

    That also express the thermal (IR) "print" that FaceID is looking for?

    You mean you have never heard of wire that will emit heat when a current is passed thru it ?

    Or maybe even just flexible plastic tubing where a bit of warm water is
    pushed thru ?

    And do excuse me if I take that "thermal (IR) faceprint" as a hogwash. It would mean that if you would be outside in changing weather conditions (changing the heat patterns in your face) you would not be able to unlock
    your phone.

    And that would be a death-sentence for the technology. They rather have a
    lot of false positives than just a handfull of false negatives.

    Regards,
    Rudy Wieser

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From R.Wieser@21:1/5 to All on Mon May 6 19:13:51 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Jolly,

    These trolls are just replying the same lines they used back when Face
    ID was first announced. They were wrong then, and they're just as wrong
    now.

    And according to you, which of the pro/con parties is trolling ?

    ... or should I just presume that you are the one trying to troll us both ?

    Regards,
    Rudy Wieser

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to Alan Browne on Mon May 6 16:24:27 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-06, Alan Browne <bitbucket@blackhole.com> wrote:
    On 2024-05-06 05:51, R.Wieser wrote:
    Arno,

    Except that unlocking with your face in iOS is *not* only using an
    image of your face but also the three dimensional shape of it.

    Yes, and ? 3D printers exist.

    That also express the thermal (IR) "print" that FaceID is looking for?

    These trolls are just replying the same lines they used back when Face
    ID was first announced. They were wrong then, and they're just as wrong
    now.

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to R.Wieser on Mon May 6 13:35:05 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-06 13:03, R.Wieser wrote:
    Alan,

    Except that unlocking with your face in iOS is *not* only using an image >>>> of your face but also the three dimensional shape of it.

    Yes, and ? 3D printers exist.

    That also express the thermal (IR) "print" that FaceID is looking for?

    You mean you have never heard of wire that will emit heat when a current is passed thru it ?

    Or maybe even just flexible plastic tubing where a bit of warm water is pushed thru ?

    Then you would need to know what the pattern was as the iPhone encoded
    it from its "learning" session.


    And do excuse me if I take that "thermal (IR) faceprint" as a hogwash. It would mean that if you would be outside in changing weather conditions (changing the heat patterns in your face) you would not be able to unlock your phone.

    Differences (not to mention the device's ML) are a thing. You dwell in absolutes and fud. (And not very good at it either).

    --
    “Patriotism is when love of your own people comes first;
    nationalism, when hate for people other than your own comes first.â€
    - Charles de Gaulle.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to R.Wieser on Mon May 6 13:37:54 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-06 13:13, R.Wieser wrote:
    Jolly,

    These trolls are just replying the same lines they used back when Face
    ID was first announced. They were wrong then, and they're just as wrong
    now.

    And according to you, which of the pro/con parties is trolling ?

    ... or should I just presume that you are the one trying to troll us both ?

    You fail again. I suggest you take leave of the field, declare victory
    for yourself (another white ribbon as when you were a child) and find
    something more in line with your meagre talents.

    --
    “Patriotism is when love of your own people comes first;
    nationalism, when hate for people other than your own comes first.â€
    - Charles de Gaulle.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to R.Wieser on Mon May 6 13:33:03 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-06 12:55, R.Wieser wrote:
    Alan,

    And do yourself a favour and look up some YouTube stuff about "hacking"
    fingerprint locks. You might be surprised how easy some of them are
    fooled.

    Easy when presented as a YT video.

    Yes, its always looks easy when its done by someone who knows he's doing.
    On a YT video or IRL.

    Not many people will actually:

    - lift the print from something
    - make the 'fake' print
    - get access to the physical phone or other device
    - get in

    Not many people wil break into houses. Yet, you have a lock on your outside doors. Your point ?

    B&E is trivial compared to the fingerprint hack.


    But now you have acknowledged its possible, all we would be discussing about is how easy/hard it would be. Thats a large step forward, padawan. :-)

    Get over yourself. You're nobody's teacher.


    --
    “Patriotism is when love of your own people comes first;
    nationalism, when hate for people other than your own comes first.â€
    - Charles de Gaulle.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan@21:1/5 to Andrew on Mon May 6 10:45:45 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-06 01:16, Andrew wrote:
    R.Wieser wrote on Mon, 6 May 2024 09:04:57 +0200 :

    Yet trying to unlock an iPhone with its owner's photo will not work

    They said the same about fingerprints. Yet, here we are ...

    The point is not about how easy it (now!) is to reproduce something like
    that, but that anyone can "take" from you what's supposed to be only yours. >>
    and you have to go through a lot of contortions if you happen to have
    their fingerprint.

    As long as you don't need the owner of said fingerprints to be present, who >> cares ?

    And do yourself a favour and look up some YouTube stuff about "hacking"
    fingerprint locks. You might be surprised how easy some of them are fooled. >>
    Yes, yes. IPhone fingerprint locks are superior and noone can bypass them. >> Go pull my other finger.

    Fingerprint biometric unlocks on most phones are only a marketing gimmick.

    Mainly you'll see the Apple religious nutjob zealots defending its use.

    That's because Apple zealots always believe everything Apple tells them to. Apple religious nutjob zealots have no capacity to think on their own.

    I'm not trying to prevent the CIA from unlocking my phone, Arlen.

    Just the dick who steals it.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan@21:1/5 to R.Wieser on Mon May 6 10:49:14 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-06 02:51, R.Wieser wrote:
    Arno,

    Except that unlocking with your face in iOS is *not* only using an image
    of your face but also the three dimensional shape of it.

    Yes, and ? 3D printers exist.

    And thats the buget solution. People who created 3D heads (and full body representations) have existed since *forever* - statues anyone? And as a more contemporary example just take a look at Madame Tussauds in New York. (and others like it).

    Yes, in Android using *images* of a face to unlock a phone is indeed
    not a good idea.

    Its a *very good* idea. It should *not ever* happen though. :-)

    Coming up with a new locking mechanism (mechanical or software) isn't all that hard. What is is to make sure that only the key designed for it can actually open it.

    If you want to see examples of how locks, even expensive ones, can be bypassed with the proverbial paperclip I would like to refer you to the "Lockpicking Lawyer" clips on YouTube. Those are enlighting.

    Yes, you incredible simpleton...

    ...but this is never about stopping people with huge amounts of
    resources from getting in.

    You put a lock on the front door of your house, not because you know it
    will stop anyone from breaking in.

    You put it there because you HOPE it will convince them to break in to somewhere EASIER.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan@21:1/5 to R.Wieser on Mon May 6 10:50:30 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-06 10:10, R.Wieser wrote:
    Chris,

    And as a more contemporary example just take a look at Madame Tussauds >>> in New York. (and others like it).

    They are universally shit. I don't understand how waxworks museums are
    still a thing. I'm sure they were amazing in Victorian times.

    Well, I do seem to remember when a certain actor took the place of his wax counterpart. The people walking by didn't even notice his different appearance from the wax puppets next to him.

    How many hours (and therefore how many DOLLARS) weren't spent creating
    the wax figure, doofus?


    Always funny to see people jump when such a "wax figure" suddenly comes to life. :-)

    Also, its not how such wax figures look exactly like the person they are supposed to represent, its about the possibility of creating a topographically close enough faximile of a persons head. You know, for
    those face-ID scanners

    Regards,
    Rudy Wieser



    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andrew@21:1/5 to Alan Browne on Mon May 6 18:24:26 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On Mon, 6 May 2024 10:59:27 -0400, Alan Browne wrote:

    What is a "3D sensor" actually?  :-)

    In the case of iPhone the 'shape' of the face is determined as described here:

    https://support.apple.com/en-ca/102381

    The term Apple uses is "depth map of your face"

    Further: "and also captures an infrared image of your face."

    Phone biometrics are nothing more or less than a marketing gimmick.

    You're the same Alan Browne on the Apple newsgroup who claims that you read white papers from Apple "proving" there is no such thing as the walled
    garden.

    Only a nutcase Apple religious zealot would deny the existence of the
    infamous walled garden - especially amongst an Android/Windows newsgroup.

    Because Apple said so, you are adamant the walled garden is a myth.
    Likewise with all the fancy words Apple marketing uses for its gimmicks.

    You only eat, drink & excrete Apple marketing bullshit gimmickry.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mickey D@21:1/5 to Chris on Mon May 6 14:56:18 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On Mon, 6 May 2024 15:06:54 +0100, Chris wrote:

    You misunderstood. It's all about identifying the EXACT camera.

    Like I said, it's been a while. Things might have improved.

    There are many forensic techniques which take advantage of the unique
    errors inherent in any camera sensor, all of which improve over time.
    https://www.mdpi.com/2313-433X/10/2/31

    Thanks.

    Not sure I see what you're seeing. The review is not very precise in its language. Looking at a couple of specific papers, they still are
    comparing make/model not specific cameras.

    This one - not peer-reviewed - supposedly labelled as "individual
    camera" with an accuracy of 99.15%, is actually only six different
    devices (two phones and four cameras). https://repository.derby.ac.uk/download/45e22f10d5dfc1d211a4392c591cd80d392237fa032ccc9f37f772a325fc91f5/922645/DIGITAL%20VIDEO%20SOURCE%20IDENTIFICATION%20BASED%20ON%20GREEN-CHANNEL%20PHOTO%20RESPONSE%20NON-UNIFORMITY%20%28G-PRNU%29.pdf

    And this one - peer-reviewed - has 11 smartphones from six difference manufacturers is similarly labelled as "individual camera" with an
    accuracy of 96.18%. https://www.sciencedirect.com/science/article/abs/pii/S1742287616300998

    I don't understand how either of those studies can be called
    individual-level identification of cameras?

    The evidence (sorry!) just isn't there. A study needs to be done with
    15-20 examples of each camera across multiple models and brands and see
    if they can be individualised.

    There are even companies that sell this software already.
    https://www.mobiledit.com/camera-ballistics

    Don't ask me how they do it though as it uses sophisticated math.

    Sorry, but the forensic market is not very healthy with plenty of
    products which sell a dream. If a product cannot back itself with
    published scientific research - rather than hide behind math - then it's snake oil. It's notable that the software has not been updated since 2017!

    There are articles out there on how to defeat it if you care to look.
    https://duckduckgo.com/&q=how+to+defeat+camera+photo+forensics

    Which is probably why things haven't moved on: it's simply of academic interest with little applicability in practice.

    I think you're doomed if you think fingerprinting is only of academic
    interest since there isn't a well funded TLA out there who isn't doing it (IMHO).

    As I said, don't ask me how it works except from the basic fundamentals,
    (which everyone already knows) which is that every camera sensor has
    millions of pixel bits, where some have inevitable color encoding errors.

    Those hardware errors are permanent, and unique to the camera.

    They simply find the same hardware errors in multiple photos and bingo.
    It's a match for that specific camera. Just like fingerprints & DNA are.

    What constantly improves are each researcher is testing his/her own special algorithm (using Fourier transforms, statistical variants, whatever) to get
    as close to 100% photo to camera fingerprinting as they can do.

    The technology (and the math) just improves over time, as you're aware.

    Probably the easiest way to explain it, as I understand it anyway, is let's
    say at x:y position 100:200 on your camera sensor is a flaw such that for
    the next 75 pixels, the colors are 20% "bluer" than all other pixels are.

    Then they would look for a region in the x direction from approximately
    25 to 175 and in the y direction from approximately 125 to 275 that has
    that built-in 20% bluer color.

    Of course you can crop a photo, so they would probably look for any area
    with that dimension which is 20% bluer, and that would be one datum.

    Put together thousands of these locales & you have a fingerprint process.

    Given the prevalence of phone photos on the net, I can't imagine that the well-funded TLAs aren't pouring billions of dollars into this research.

    Since photo fingerprint can only get better over time, what the warning is
    for is just to let people know that now, since they will scrape all the
    photos on the net if that's what they want to do.

    There are almost certainly techniques you can use to foil them but you have
    to know what they're using first.

    https://duckduckgo.com/&q=photo+forensic+fingerprinting

    There are many news articles on sensor imperfection fingerprinting. https://www.bbc.com/future/article/20210324-the-hidden-fingerprint-inside-your-photos

    And there's even a book on Multimedia Forensics you can download for free. https://link.springer.com/chapter/10.1007/978-981-16-7621-5_4

    Here's the PDF for the sensor identification chapter. https://link.springer.com/content/pdf/10.1007/978-981-16-7621-5.pdf

    And the EPUB. https://link.springer.com/download/epub/10.1007/978-981-16-7621-5.epub

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From R.Wieser@21:1/5 to All on Mon May 6 21:38:21 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Alan,

    B&E is trivial compared to the fingerprint hack.

    That fully depends on the locks.

    But now you have acknowledged its possible, all we would be discussing
    about is how easy/hard it would be. Thats a large step forward, padawan.
    :-)

    Get over yourself. You're nobody's teacher.

    I already did.

    regards,
    Rudy Wieser

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From R.Wieser@21:1/5 to All on Mon May 6 22:10:04 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Alan,

    You mean you have never heard of wire that will emit heat when a current
    is
    passed thru it ?

    Or maybe even just flexible plastic tubing where a bit of warm water is
    pushed thru ?

    Then you would need to know what the pattern was as the iPhone encoded it from its "learning" session.

    No, I don't. Thats the lock. The face would be the key. You would only
    have to
    make an acceptable faximile of the key.

    Let me tell you a stupid story :
    Once passwords where send to the server in plain text
    Some person though that wasn't very secure - a smart guy.
    So, he thought that he should encrypt the password before sending it
    He was rather surprised when someone broke into his account as easily as
    with a plain-text password.

    Can you figure out his mistake ? 'cause you are making the same one.

    And do excuse me if I take that "thermal (IR) faceprint" as a hogwash.
    It
    would mean that if you would be outside in changing weather conditions
    (changing the heat patterns in your face) you would not be able to unlock
    your phone.

    Differences (not to mention the device's ML) are a thing. You dwell in absolutes and fud. (And not very good at it either).

    It looks to me that you are the one thinking in absolutes. As if every face responds the same way to differences in temperature.

    As for FUD ? Thinking and claiming that finger- and faceprint lock are
    "tha sh*t" is, to me, just you falling for the sales department doing the opposite of FUD (praising their stuff into high-heaven).

    Feel free to disagree - but I do expect a bit more than "I don't believe
    you" responses.

    Regards,
    Rudy Wieser

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From R.Wieser@21:1/5 to All on Mon May 6 22:08:22 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Alan,

    These trolls are just replying the same lines they used back when Face
    ID was first announced. They were wrong then, and they're just as wrong
    now.

    And according to you, which of the pro/con parties is trolling ?

    ... or should I just presume that you are the one trying to troll us both
    ?

    You fail again. I suggest you take leave of the field, declare victory
    for yourself (another white ribbon as when you were a child) and find something more in line with your meagre talents.

    All I see is someone who claims stuff, but brings nothing forward to support it. A hot-air balloon.

    Regards,
    Rudy Wieser

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan@21:1/5 to Andrew on Mon May 6 13:49:02 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-06 11:24, Andrew wrote:
    On Mon, 6 May 2024 10:59:27 -0400, Alan Browne wrote:

    What is a "3D sensor" actually?� :-)

    In the case of iPhone the 'shape' of the face is determined as described
    here:

    https://support.apple.com/en-ca/102381

    The term Apple uses is "depth map of your face"

    Further: "and also captures an infrared image of your face."

    Phone biometrics are nothing more or less than a marketing gimmick.

    Biometric unlocking is a way to make phones convenient for the user
    while sufficiently inconvenient for miscreants.

    Period.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Paul@21:1/5 to Carlos E.R. on Mon May 6 16:28:16 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 5/6/2024 4:23 AM, Carlos E.R. wrote:
    On 2024-05-06 10:04, Arno Welzel wrote:
    R.Wieser, 2024-05-05 22:20:

    Mickey,

    Be careful - they can lift a fingerprint off a digital photo.

    And thats just one of the more complex methods there are.

    You touch surfaces almost every day without even realizing it - hey, that is
    what hands and fingers are for, right ? - effectivily broadcasting that
    feature of yourself to everyone around you.

    Same goes for "faceprints".  Even easier, as your faceprint can be "taken" >>> from literally tens of meters away.

    Except that unlocking with your face in iOS is *not* only using an image
    of your face but also the three dimensional shape of it. That's the
    reason why the "notch" in the iPhone displays is bigger since there is
    not only a camera but also a 3D sensor to capture the shape of your face.

    What is a "3D sensor" actually?  :-)


    Stereoscopic imaging is a start.

    For an encyclopedic article, you have to do a lot of guessing here.

    https://en.wikipedia.org/wiki/Intel_RealSense

    The third party sensor there, the article makes it seem it is a
    single array, but there are enough pixels for two arrays. And like
    the human eye, as long as the collecting optics are separated by
    enough, you get some extract-able depth information.

    Some of the cameras Intel makes, have an IR projector, and the "ordinary" sensor
    arrays in the Intel camera see out far enough, to pick up the IR pattern.

    https://dev.intelrealsense.com/docs/projectors

    For Windows Hello, this additional information (collect depth info
    from projected IR onto a 3D object), was supposed to make it harder
    to fake an authenticating face. But I think hackers managed to defeat
    Windows Hello anyway.

    One of the things with these cameras, is they don't always have
    a fleet of "ready applications" for end users. They can include
    an SDK and you write your own software.

    One of the things on the SDK for the Intel camera, is you can
    stick the head of a statue on a turntable, and rotate the object
    slowly, and the Intel RealSense camera will give you a file suitable
    for 3D printing. And you can make a "copy" of the object you just scanned
    (out of filament).

    One software person working with the Intel kit, called what the
    Intel camera was sending a "point cloud", and that's also a
    terminology used with LIDAR systems for automobiles.

    The LIDAR industry still exists, but they've been keeping a low profile :-/

    https://cleantechnica.com/2021/03/12/lidar-may-be-harmful-to-people-cameras/

    Paul

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to R.Wieser on Mon May 6 16:56:58 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-06 16:08, R.Wieser wrote:
    Alan,

    These trolls are just replying the same lines they used back when Face >>>> ID was first announced. They were wrong then, and they're just as wrong >>>> now.

    And according to you, which of the pro/con parties is trolling ?

    ... or should I just presume that you are the one trying to troll us both >>> ?

    You fail again. I suggest you take leave of the field, declare victory
    for yourself (another white ribbon as when you were a child) and find
    something more in line with your meagre talents.

    All I see is someone who claims stuff, but brings nothing forward to support it. A hot-air balloon.

    Well, it seems that your mirror is polished to perfection, at least.
    You've got that.

    --
    “Patriotism is when love of your own people comes first;
    nationalism, when hate for people other than your own comes first.â€
    - Charles de Gaulle.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to R.Wieser on Mon May 6 16:59:07 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-06 16:10, R.Wieser wrote:
    Alan,

    You mean you have never heard of wire that will emit heat when a current >>> is
    passed thru it ?

    Or maybe even just flexible plastic tubing where a bit of warm water is
    pushed thru ?

    Then you would need to know what the pattern was as the iPhone encoded it
    from its "learning" session.

    No, I don't. Thats the lock. The face would be the key. You would only
    have to
    make an acceptable faximile of the key.

    Completely wrong and proving you don't understand the issue. At all -
    not an iota.

    <Ramble snipped>

    Feel free to disagree - but I do expect a bit more than "I don't believe
    you" responses.

    My responses are not based on my not believing you - they are based on
    you not understanding the basic problem at all.

    --
    “Patriotism is when love of your own people comes first;
    nationalism, when hate for people other than your own comes first.â€
    - Charles de Gaulle.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to Paul on Mon May 6 17:02:40 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-06 16:28, Paul wrote:
    On 5/6/2024 4:23 AM, Carlos E.R. wrote:

    What is a "3D sensor" actually?  :-)


    Stereoscopic imaging is a start.

    Which, alas is not what the iPhone does in FaceID. To be clear, stereo requires at least two points of view (say two cameras a little bit
    apart, or images taken from a slightly different position. This is a
    passive process as well (in most cases).

    What FaceID does is project a pattern onto the face and then measure the positions to generate a depth map from a single POV sensor (therefore
    not stereoscopic).

    --
    “Patriotism is when love of your own people comes first;
    nationalism, when hate for people other than your own comes first.â€
    - Charles de Gaulle.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to Alan on Mon May 6 17:04:05 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-06 16:49, Alan wrote:
    On 2024-05-06 11:24, Andrew wrote:
    On Mon, 6 May 2024 10:59:27 -0400, Alan Browne wrote:

    What is a "3D sensor" actually?� :-)

    In the case of iPhone the 'shape' of the face is determined as described >>> here:

    https://support.apple.com/en-ca/102381

    The term Apple uses is "depth map of your face"

    Further: "and also captures an infrared image of your face."

    Phone biometrics are nothing more or less than a marketing gimmick.

    Biometric unlocking is a way to make phones convenient for the user
    while sufficiently inconvenient for miscreants.

    They are also a key feature of "Passkey" related login procedures which
    are gaining momentum as a preferred way for people to log into various
    sites.

    --
    “Patriotism is when love of your own people comes first;
    nationalism, when hate for people other than your own comes first.â€
    - Charles de Gaulle.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to R.Wieser on Mon May 6 23:49:21 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-06, R.Wieser <address@is.invalid> wrote:
    Jolly,

    These trolls are just replying the same lines they used back when
    Face ID was first announced. They were wrong then, and they're just
    as wrong now.

    And according to you, which of the pro/con parties is trolling ?

    The ones who are beating a dead horse about things we discussed when
    Face ID first hit the market and umpteen times after, always trying to
    claim it's "insecure" and so on, and never knowing or acknowledging how
    it differs from other smartphone facial identification designs. They
    know who they are. Either you don't, or you are one of them and are now offended that anyone should dare to call them out. Which is it?

    ... or should I just presume that you are the one trying to troll us
    both ?

    Trolls are bullies at heart, and bullies *always* try to claim they are
    the ones /AKTUALLY/ being bullied. Is this your claim now?

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Paul@21:1/5 to Alan Browne on Mon May 6 21:44:52 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 5/6/2024 5:02 PM, Alan Browne wrote:
    On 2024-05-06 16:28, Paul wrote:
    On 5/6/2024 4:23 AM, Carlos E.R. wrote:

    What is a "3D sensor" actually?  :-)


    Stereoscopic imaging is a start.

    Which, alas is not what the iPhone does in FaceID.  To be clear, stereo requires at least two points of view (say two cameras a little bit apart, or images taken from a slightly different position.  This is a passive process as well (in most cases).

    What FaceID does is project a pattern onto the face and then measure the positions to generate a depth map from a single POV sensor (therefore not stereoscopic).


    The Intel projects a pattern too.

    https://dev.intelrealsense.com/docs/projectors

    The Wikipedia article, traces the history:

    https://en.wikipedia.org/wiki/Face_ID

    "Face ID's technology is based on PrimeSense's previous work with low-cost
    infrared depth perception that was the basis of the Kinect motion sensor
    for the Xbox console line from Microsoft; Apple had acquired PrimeSense
    in 2013 after Microsoft started to wane on the use of Kinect"

    The Intel article here mentions:

    https://dev.intelrealsense.com/docs/projectors

    "Furthermore, different types of projectors were used for each camera. The
    D415 uses two AMS Heptagon projectors, while the D435 uses an AMS Princeton
    Optronics projector with a wider emission angle but fewer spots" (Not the same as PrimeSense necessarily)

    "In the current systems, these projectors have been placed between the
    left and right stereo imagers, and they are generally also synched to
    turn on only when required.

    However, it is important to note that this is not a strict requirement.
    For Active Stereo Depth systems, no a priori knowledge of the projection
    pattern is needed and there is no requirement of strict stability over
    time of these patterns. Also, it does not matter if other cameras point
    at the same scene with their projectors. To a first order, all additional
    projectors actually improve the overall performance by adding more light
    and more texture. We emphasize this property here, because it is in stark
    contrast to “structured light†or “coded light†depth sensors that many
    are familiar with (ex: The Microsoft Kinect, RealSense F200 and SR305,
    Orbbec Astra, or Apple iPhone X)

    where there are strong requirements on pattern stability across time and
    temperature that ultimately lead to increased cost and make them more
    susceptible to external interference."

    That's a section comparing the schemes.

    Paul

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Arno Welzel@21:1/5 to All on Tue May 7 08:53:10 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    R.Wieser, 2024-05-06 18:55:

    Alan,

    And do yourself a favour and look up some YouTube stuff about "hacking"
    fingerprint locks. You might be surprised how easy some of them are
    fooled.

    Easy when presented as a YT video.

    Yes, its always looks easy when its done by someone who knows he's doing.
    On a YT video or IRL.

    Not many people will actually:

    - lift the print from something
    - make the 'fake' print
    - get access to the physical phone or other device
    - get in

    Not many people wil break into houses. Yet, you have a lock on your outside doors. Your point ?

    That's the reason why banks have safes and do not only rely on the
    security of simple door locks.

    --
    Arno Welzel
    https://arnowelzel.de

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Arno Welzel@21:1/5 to All on Tue May 7 09:05:15 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Andrew, 2024-05-06 20:24:

    On Mon, 6 May 2024 10:59:27 -0400, Alan Browne wrote:

    What is a "3D sensor" actually?� :-)

    In the case of iPhone the 'shape' of the face is determined as described
    here:

    https://support.apple.com/en-ca/102381

    The term Apple uses is "depth map of your face"

    Further: "and also captures an infrared image of your face."

    Phone biometrics are nothing more or less than a marketing gimmick.

    Scanning the *shape* of a face and not just the *image* is still a
    different approach than just using the image and that's one of the main
    reasons why Google does not include "face unlock" in their Pixel phones,
    since just using an image of someones face is way to simple.

    Besides that you can call most "real" biometrics a "marketing gimmick"
    since you can *always* make a copy of the images which are used for
    fingerprint scanners, eye scanners and so on. The question is not, if
    something is absolutly secure and can never be broken at all but how
    much effort is needed to break something.

    When I got my last passport I also had to provide biometric scans of my fingers. The way how that fingerprint scanner worked was just taking an
    *image* of my fingerprints:

    <https://www.dermalog.com/products/hardware/fingerprint-scanners/f1>

    "DERMALOG F1 – One of the World’s Smallest Optical Fingerprint Scanners

    Its compliance to international standards make the F1 suitable for a
    wide range of biometric documents and application possibilities -
    capturing fingerprints for ePassports, ID Cards and
    verification-processes within the blink of an eye. The self-explanatory DERMALOG solution meets international standards defined for biometric workflows."

    They even advertise the use of their fingerprint scanners for biometric
    ID cards:

    <https://www.dermalog.com/turnkey-solutions/government/biometric-id-cards>

    And yes, it is just optical, nothing else. So anyone can fake the
    fingerprints, even those which are included scanned with an "official"
    device used by authorities.


    --
    Arno Welzel
    https://arnowelzel.de

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Arno Welzel@21:1/5 to All on Tue May 7 09:08:28 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Alan Browne, 2024-05-06 23:02:

    On 2024-05-06 16:28, Paul wrote:
    On 5/6/2024 4:23 AM, Carlos E.R. wrote:

    What is a "3D sensor" actually?  :-)


    Stereoscopic imaging is a start.

    Which, alas is not what the iPhone does in FaceID. To be clear, stereo requires at least two points of view (say two cameras a little bit
    apart, or images taken from a slightly different position. This is a
    passive process as well (in most cases).

    I did not state, that Apple uses steroscopic imaging, just an additional
    sensor beside the camera so the three dimensional shape of the face is
    also taken into account for the unlock process and not just the visual
    image of it.

    What FaceID does is project a pattern onto the face and then measure the positions to generate a depth map from a single POV sensor (therefore
    not stereoscopic).

    Exactly. And this is more than just comparing an image, so you can not
    fool the system by just using an image of the owner in a flat medium in
    front of the camera.

    --
    Arno Welzel
    https://arnowelzel.de

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Arno Welzel@21:1/5 to All on Tue May 7 09:13:00 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    R.Wieser, 2024-05-06 11:51:

    [...]>> Yes, in Android using *images* of a face to unlock a phone is indeed
    not a good idea.

    Its a *very good* idea. It should *not ever* happen though. :-)

    If something should not ever happen, it is not a good idea.

    [...]
    If you want to see examples of how locks, even expensive ones, can be bypassed with the proverbial paperclip I would like to refer you to the "Lockpicking Lawyer" clips on YouTube. Those are enlighting.

    I know the Lockpicking Lawyer quite well.

    --
    Arno Welzel
    https://arnowelzel.de

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From R.Wieser@21:1/5 to All on Tue May 7 09:40:54 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Jolly,

    These trolls are just replying the same lines they used back when
    Face ID was first announced. They were wrong then, and they're just
    as wrong now.

    And according to you, which of the pro/con parties is trolling ?

    The ones who are beating a dead horse about things we discussed when
    Face ID first hit the market and umpteen times after, always trying
    to claim it's "insecure" and so on, and never knowing or acknowledging
    how it differs from other smartphone facial identification designs.

    Ah, now I see where you are coming from. One of Alans compadres, no ?

    Feel free to explain/underbuild why that that face-ID was secure than, and
    than how its still secure now - even with technology going forward.

    And if you want to claim that what was once secure(?) still must be so, let
    me point out to you how cracking several kinds of, now discarded, SSL encryptions has changed from not in your lifetime to less than a day (and
    even shorter than that) is now a thing.

    No Jolly, the only thing I see here is someone who tries to kill a
    discussion even before has the chance to start. And those people often
    have something to hide. What is it that you are trying to hide ?

    They know who they are. Either you don't, or you are one of them and
    are now offended that anyone should dare to call them out. Which is it?

    You post something that could easily have been about either/all of the
    parties involved in that "back when Face ID was first announced" talk, and
    you are offended by me asking for something less ambigue ? Why ?


    And seeing how your current response could still be about any of those
    parties I start to wonder if that is not intentionally ...

    Regards,
    Rudy Wieser

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From R.Wieser@21:1/5 to All on Tue May 7 10:12:17 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Arno,

    Not many people wil break into houses. Yet, you have a lock on
    your outside doors. Your point ?

    That's the reason why banks have safes and do not only rely on
    the security of simple door locks.

    Not the point I tried to make.


    But if you want to talk about that, besides the problem that most banks had their front doors wide open - how else could they let customers in - you're
    now looking about how complex a lock must be* before it stop someone from (easily!) entering.

    * assuming they will actually try to open (fool/break) the lock, and not
    just find an easier point of entry.

    Did I already mention "the lockpicking lawyer" on YouTube ? Its
    sometimes laughable to see how easy a, on first sight sturdy, lock can be defeated.

    Yes, in Android using *images* of a face to unlock a phone is
    indeed not a good idea.

    Its a *very good* idea. It should *not ever* happen though. :-)

    If something should not ever happen, it is not a good idea.

    You misunderstood : Its a very good idea to *try*. If it works you know
    that it failed its primary duty. :-)

    Too many people build stuff that does {this} when you do {that} - but forget
    to check if {this} cannot also be gotten by doing {something else}.

    I remember a gate which needed a key to open it - but you could also reach
    thru the gate to get to the handle on the other side, and open it that way.

    I know the Lockpicking Lawyer quite well.

    In that case I withdraw my above suggestion in that direction. :-)

    Regards,
    Rudy Wieser

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From R.Wieser@21:1/5 to All on Tue May 7 09:17:51 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Alan,

    You fail again. I suggest you take leave of the field, declare victory
    for yourself (another white ribbon as when you were a child) and find
    something more in line with your meagre talents.

    All I see is someone who claims stuff, but brings nothing forward to
    support
    it. A hot-air balloon.

    Well, it seems that your mirror is polished to perfection, at least.
    You've got that.

    :-) You can't "win" your argument (because yo have no clue how to underbuild your posirtion) so you decide that switching to a more personal attack is in order ? Yeah, that always works well.

    No, I don't. Thats the lock. The face would be the key. You would only
    have to make an acceptable faximile of the key.

    Completely wrong and proving you don't understand the issue. At all - not
    an iota.

    Claims made without underbuilding or at least explaining them aren't worth worth the ink with which they are written.

    ... oh, wait. :-)

    Feel free to disagree - but I do expect a bit more than "I don't believe
    you" responses.

    My responses are not based on my not believing you - they are based on you not understanding the basic problem at all.

    I think the problem is reversed : you are supporting a technology which you have little-to-no knowledge about, and can't even come up with obvious solutions to things you think are a problem.

    Just take your "you can't use picture" problem and how I had to tell you
    that 3D imagery has existed for the longest time, and nowerdays even in multiple forms.

    ... and how you tried to derail that by complaining how wax figures are, in your opinion, not at all alike the origional. As if that was what I was talking about or even needed.

    You also have otherwise resorted to try to disqualify examples I brought forward - YT, the lockpicking lawyer - on the torturous grounds that those "look too easy".

    Bottom line :
    I see someone who knows he has nothing to bring forward to the subject at
    hand, and than just tries to derail the whole thing - No doubt in an "if he doesn't win than I'm not losing" kind of idea.

    Alas, I would not have minded to learn more about the technology, but you
    sure aren't the one to do so.

    Goodbye kid.

    Regards,
    Rudy Wieser

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to Arno Welzel on Tue May 7 08:27:29 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-07 03:08, Arno Welzel wrote:
    Alan Browne, 2024-05-06 23:02:

    On 2024-05-06 16:28, Paul wrote:
    On 5/6/2024 4:23 AM, Carlos E.R. wrote:

    What is a "3D sensor" actually?  :-)


    Stereoscopic imaging is a start. [AAA] <-------

    Which, alas is not what the iPhone does in FaceID. To be clear, stereo
    requires at least two points of view (say two cameras a little bit
    apart, or images taken from a slightly different position. This is a
    passive process as well (in most cases).

    I did not state, that Apple uses steroscopic imaging,

    <snipped>

    You left a TL;DR sort of reply. By bringing up (to get going) an item irrelevant to the subject [AAA] above doesn't get you much traction, alas.

    --
    “Patriotism is when love of your own people comes first;
    nationalism, when hate for people other than your own comes first.â€
    - Charles de Gaulle.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to R.Wieser on Tue May 7 08:29:18 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-07 03:17, R.Wieser wrote:
    Alan,

    You fail again. I suggest you take leave of the field, declare victory >>>> for yourself (another white ribbon as when you were a child) and find
    something more in line with your meagre talents.

    All I see is someone who claims stuff, but brings nothing forward to
    support
    it. A hot-air balloon.

    Well, it seems that your mirror is polished to perfection, at least.
    You've got that.

    :-) You can't "win" your argument

    You brought up several examples of your utter lack of understanding of
    how Face ID works.

    So, true to troll form you counter with more nonsense.


    --
    “Patriotism is when love of your own people comes first;
    nationalism, when hate for people other than your own comes first.â€
    - Charles de Gaulle.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Arno Welzel@21:1/5 to All on Tue May 7 17:28:32 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    R.Wieser, 2024-05-07 10:12:

    [...]
    Yes, in Android using *images* of a face to unlock a phone is
    indeed not a good idea.
    [...]
    You misunderstood : Its a very good idea to *try*. If it works you know
    that it failed its primary duty. :-)

    Ok, that makes more sense.

    Too many people build stuff that does {this} when you do {that} - but forget to check if {this} cannot also be gotten by doing {something else}.

    Of course. And this is the reason why unlocking a phone just providing a picture of the owner is not possible with a Google Pixel 6a. Getting a
    picture of a persons face is much easier than getting the fingerprints
    and replicating them in a way that the fingerprint sensor will accept them.

    --
    Arno Welzel
    https://arnowelzel.de

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to R.Wieser on Tue May 7 15:18:58 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-07, R.Wieser <address@is.invalid> wrote:
    Jolly,

    These trolls are just replying the same lines they used back when
    Face ID was first announced. They were wrong then, and they're just
    as wrong now.

    And according to you, which of the pro/con parties is trolling ?

    The ones who are beating a dead horse about things we discussed when
    Face ID first hit the market and umpteen times after, always trying
    to claim it's "insecure" and so on, and never knowing or
    acknowledging how it differs from other smartphone facial
    identification designs.

    Ah, now I see where you are coming from. One of Alans compadres, no ?

    Hardly. Arlen and his little band of trolls is more like it. They've
    been at this for literal years here.

    Feel free to explain/underbuild why that that face-ID was secure than,
    and than how its still secure now - even with technology going
    forward.

    Is that supposed to be English?

    And if you want to claim that what was once secure(?) still must be
    so, let me point out to you how cracking several kinds of, now
    discarded, SSL encryptions has changed from not in your lifetime to
    less than a day (and even shorter than that) is now a thing.

    "SSL can be cracked, therefore Face ID is insecure" is a new sentence I
    hadn't anticipated reading this morning. Thanks for the giggle.

    You're clearly not a sincere person. I see no need to continue wasting
    my time with you.

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Arno Welzel@21:1/5 to All on Tue May 7 17:33:52 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Arno Welzel, 2024-05-07 09:05:

    Andrew, 2024-05-06 20:24:

    On Mon, 6 May 2024 10:59:27 -0400, Alan Browne wrote:

    What is a "3D sensor" actually?� :-)

    In the case of iPhone the 'shape' of the face is determined as described >>> here:

    https://support.apple.com/en-ca/102381

    The term Apple uses is "depth map of your face"

    Further: "and also captures an infrared image of your face."

    Phone biometrics are nothing more or less than a marketing gimmick.

    Scanning the *shape* of a face and not just the *image* is still a
    different approach than just using the image and that's one of the main reasons why Google does not include "face unlock" in their Pixel phones, since just using an image of someones face is way to simple.

    Besides that you can call most "real" biometrics a "marketing gimmick"
    since you can *always* make a copy of the images which are used for fingerprint scanners, eye scanners and so on. The question is not, if something is absolutly secure and can never be broken at all but how
    much effort is needed to break something.

    When I got my last passport I also had to provide biometric scans of my fingers. The way how that fingerprint scanner worked was just taking an *image* of my fingerprints:

    <https://www.dermalog.com/products/hardware/fingerprint-scanners/f1>

    "DERMALOG F1 – One of the World’s Smallest Optical Fingerprint Scanners

    Its compliance to international standards make the F1 suitable for a
    wide range of biometric documents and application possibilities -
    capturing fingerprints for ePassports, ID Cards and
    verification-processes within the blink of an eye. The self-explanatory DERMALOG solution meets international standards defined for biometric workflows."

    They even advertise the use of their fingerprint scanners for biometric
    ID cards:

    <https://www.dermalog.com/turnkey-solutions/government/biometric-id-cards>

    And yes, it is just optical, nothing else. So anyone can fake the fingerprints, even those which are included scanned with an "official"
    device used by authorities.

    Addition: yes, the device also checks, if the scanned finger is alive
    and won't accept just an image. But the result is still just an *image*
    which is used for the biometric data in the passport. And creating fake
    fingers including the properties required for "alive" detection or fake fingerprints you can stick to your fingertips is not impossible either.

    --
    Arno Welzel
    https://arnowelzel.de

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From R.Wieser@21:1/5 to All on Tue May 7 18:42:26 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Jolly,

    Feel free to explain/underbuild why that that face-ID was secure
    than, and than how its still secure now - even with technology
    going forward.

    Is that supposed to be English?

    What ? Thats too hard for you to understand ? Not "English" enough for
    your taste ?

    "SSL can be cracked, therefore Face ID is insecure" is a new sentence
    I hadn't anticipated reading this morning. Thanks for the giggle.

    Oh well, someone "doesn't understand" a simple example. How delightfully
    new.

    You're clearly not a sincere person.

    Goodness! After having read that "I can't understand a word of what you're saying" drivel that was exactly what I was thinking about you.

    I see no need to continue wasting my time with you.

    I see someone who refuses to answer a simple question, and than trying to
    make a run for it, while making it sound as if its all the other persons
    fault.

    Yeah, thats not at all obvious. Not at all, no sirree. :-)

    Regards,
    Rudy Wieser

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From R.Wieser@21:1/5 to All on Tue May 7 19:07:25 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Arno,

    You misunderstood : Its a very good idea to *try*. If it works you
    know that it failed its primary duty. :-)

    Ok, that makes more sense.

    Phew .... :-)

    Of course. And this is the reason why unlocking a phone just providing
    a picture of the owner is not possible with a Google Pixel 6a.

    Thats what I've ben told too.

    Getting a picture of a persons face is much easier than getting the fingerprints and replicating them in a way that the fingerprint sensor
    will accept them.

    I wasn't trying to compare the two, I was just trying to convey that its
    quite likely that a face-ID can be fooled in the same way a fingerprint can
    : by duplicating the key - or just a well-enough faximile of it.

    And as the OP couldn't look further than a photograph - I mean - further
    than his nose is long I tried to tell him that making 3D likenesses of a
    head is well possibly older than our christian calendar.

    And as the intended victim is showing off his key every moment of the day I cannot escape the feeling that a few pictures (from diferent angles) would
    be enough for a 'puter (or a person) to construct a 3D model from it. Take few more pictures with an heat (IR?) camera and you likely have the
    mentioned heatmap for that face too.

    Did I forget anything ?

    No, I didn't say it would be easy. But I don't think its impossible either. Just, for the first few times(!), a lengthy and costly job.

    Regards,
    Rudy Wieser

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Frank Slootweg@21:1/5 to All on Tue May 7 18:35:11 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Jolly,

    Feel free to explain/underbuild why that that face-ID was secure
    than, and than how its still secure now - even with technology
    going forward.

    Is that supposed to be English?

    What ? Thats too hard for you to understand ? Not "English" enough for
    your taste ?

    Not to support Jolly Roger, but there are many, probaby too many,
    errors in your sentence.

    You make *these* (two) errors very often - as in nearly always - so
    let me explain, so you can try to prevent them in future.

    You're mixing up 'then' [1] and 'than' [2]. In this case, the 'than's
    should have been 'then's.

    And (AFAIK), "underbuild" is not an English word/verb. You're probably looking for the equivalent of Dutch 'onderbouwen'.

    These are not the only errors in your sentence, but with these errors,
    the sentence is indeed hard to parse for an English 'speaker'. (As a
    Dutchman, I can quite easily parse this.)

    [...]

    [1] <https://translate.google.com/details?sl=en&tl=nl&text=then%0A&op=translate>

    [2] <https://translate.google.com/details?sl=en&tl=nl&text=than%0A&op=translate>

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From R.Wieser@21:1/5 to All on Tue May 7 22:11:03 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Frank,

    Feel free to explain/underbuild why that that face-ID was secure
    than, and than how its still secure now - even with technology
    going forward.

    Not to support Jolly Roger, but there are many, probaby too
    many, errors in your sentence.

    Enough *not* to convey the meaning of what I tried to say ?

    You're mixing up 'then' [1] and 'than' [2]. In this case, the
    'than's should have been 'then's.

    I realized only after posting that I made that error. But are you sure,
    *both* of them ? I though only the first one.

    The second is indicating a moment after having done something else. In that case I though that a "than" was in order. ( https://www.grammarly.com/blog/than-then/ )

    But ok, I made a mistake there.

    And (AFAIK), "underbuild" is not an English word/verb. You're
    probably looking for the equivalent of Dutch 'onderbouwen'.

    You hit the nail on the head. A too-literal translation. Strange, I've
    been using it for a while now (as in: years), but as far as I remember
    you're to the first one to remark upon it.

    And I see (a quick google) that the word I *should* (I think) have used is "support". I'll have to remember that.

    These are not the only errors in your sentence,

    Pray tell. You might not believe it, but I've got zero problems with being told wrong as part of an attempt to help me better myself (upto a point ofcourse :-) ).

    but with these errors, the sentence is indeed hard to parse for
    an English 'speaker'. (As a Dutchman, I can quite easily parse this.)

    I can understand that. Ill try to keep the "steenkolen Engels" outof my writings.

    Thanks for the heads-up.

    Regards,
    Rudy Wieser

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to R.Wieser on Wed May 8 02:08:45 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-07, R.Wieser <address@is.invalid> wrote:
    Jolly,

    Feel free to explain/underbuild why that that face-ID was secure
    than, and than how its still secure now - even with technology going
    forward.

    Is that supposed to be English?

    What ? Thats too hard for you to understand ? Not "English" enough
    for your taste ?

    You also don't put a space between the end of a sentence and the last punctuation mark. So it seems you don't have a very good grasp of
    English overall. Whoever taught you English really did you dirty.

    "SSL can be cracked, therefore Face ID is insecure" is a new sentence
    I hadn't anticipated reading this morning. Thanks for the giggle.

    Oh well, someone "doesn't understand" a simple example. How
    delightfully new.

    More like a bad allegory. Nobody here has claimed Face ID is the most
    secure thing on the planet. What people are objecting to is the tired,
    old, crusty trolls trying to claim its supposedly "insecure" just
    because someone with tons of time, money, and will power might be able
    to crack it. These trolls are weak and boring to anyone who has seen
    them before.

    You're clearly not a sincere person.

    Goodness! After having read that "I can't understand a word of what
    you're saying" drivel that was exactly what I was thinking about you.

    "No, you"? Is that the best response you have, really?

    Regards,
    Rudy Wieser

    Bye now.

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Arno Welzel@21:1/5 to All on Wed May 8 11:49:39 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    R.Wieser, 2024-05-07 19:07:

    [...]
    And as the intended victim is showing off his key every moment of the day I cannot escape the feeling that a few pictures (from diferent angles) would
    be enough for a 'puter (or a person) to construct a 3D model from it. Take few more pictures with an heat (IR?) camera and you likely have the
    mentioned heatmap for that face too.

    Did I forget anything ?

    No, I didn't say it would be easy. But I don't think its impossible either. Just, for the first few times(!), a lengthy and costly job.

    *Nothing* is impossible to break. It is *always* a question of how much
    effort is needed to break a thing. If anyone claims to have an
    "unbreakable" solution he lies.

    --
    Arno Welzel
    https://arnowelzel.de

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Carlos E.R.@21:1/5 to Chris on Wed May 8 12:36:57 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-06 12:41, Chris wrote:
    On 06/05/2024 09:23, Carlos E.R. wrote:
    On 2024-05-06 10:04, Arno Welzel wrote:
    R.Wieser, 2024-05-05 22:20:

    Mickey,

    Be careful - they can lift a fingerprint off a digital photo.

    And thats just one of the more complex methods there are.

    You touch surfaces almost every day without even realizing it - hey,
    that is
    what hands and fingers are for, right ? - effectivily broadcasting that >>>> feature of yourself to everyone around you.

    Same goes for "faceprints".  Even easier, as your faceprint can be
    "taken"
    from literally tens of meters away.

    Except that unlocking with your face in iOS is *not* only using an image >>> of your face but also the three dimensional shape of it. That's the
    reason why the "notch" in the iPhone displays is bigger since there is
    not only a camera but also a 3D sensor to capture the shape of your
    face.

    What is a "3D sensor" actually?  :-)

    It's an infrared projection of a known pattern onto your face which
    provides a 3D map of the shape of your face. By comparing the
    distortions of the pattern between known and unknown faces you can check whether a person is able unlock the phone.

    Interesting.

    --
    Cheers, Carlos.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From R.Wieser@21:1/5 to All on Wed May 8 12:31:34 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Arno,

    *Nothing* is impossible to break. It is *always* a question of how much effort is needed to break a thing. If anyone claims to have an
    "unbreakable" solution he lies.

    Absolutily.

    But what I tried to convey is that the "first rule" of keys is to keep them outof sight of other people - which you simply can't do with either finger
    or faceprints. *Thats*, as far as I'm concerned, the bloody stupid thing
    about it.

    People using such "broadcasted" biometrics just make it too easy for a malversant.

    Regards,
    Rudy Wieser

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Carlos E.R.@21:1/5 to Paul on Wed May 8 12:43:33 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-06 22:28, Paul wrote:
    On 5/6/2024 4:23 AM, Carlos E.R. wrote:
    On 2024-05-06 10:04, Arno Welzel wrote:
    R.Wieser, 2024-05-05 22:20:

    ...

    Except that unlocking with your face in iOS is *not* only using an image >>> of your face but also the three dimensional shape of it. That's the
    reason why the "notch" in the iPhone displays is bigger since there is
    not only a camera but also a 3D sensor to capture the shape of your face. >>
    What is a "3D sensor" actually?  :-)


    Stereoscopic imaging is a start.

    For an encyclopedic article, you have to do a lot of guessing here.

    https://en.wikipedia.org/wiki/Intel_RealSense

    ...

    Thanks :-)

    --
    Cheers, Carlos.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Frank Slootweg@21:1/5 to R.Wieser on Wed May 8 13:53:09 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    R.Wieser <address@is.invalid> wrote:
    Frank,

    Feel free to explain/underbuild why that that face-ID was secure
    than, and than how its still secure now - even with technology
    going forward.

    Not to support Jolly Roger, but there are many, probaby too
    many, errors in your sentence.

    Enough *not* to convey the meaning of what I tried to say ?

    Yes, not enough for a native English speaker. Speakers of languages
    similar to Dutch might be able to parse (more of) it.

    You're mixing up 'then' [1] and 'than' [2]. In this case, the
    'than's should have been 'then's.

    I realized only after posting that I made that error. But are you sure, *both* of them ? I though only the first one.

    Yes, both of them. Neither of them is a comparison, which would call
    for 'than'.

    The second is indicating a moment after having done something else. In that case I though that a "than" was in order. ( https://www.grammarly.com/blog/than-then/ )

    That's a good reference, but I think my (snipped) references are
    simpler, i.e. not so many words.

    But ok, I made a mistake there.

    When I'm unsure about 'then' versus 'than', I ask myself if it's a comparison, i.e. "greater than", "lighter than", etc.. If so, it's
    'than', else it's then.

    And (AFAIK), "underbuild" is not an English word/verb. You're
    probably looking for the equivalent of Dutch 'onderbouwen'.

    You hit the nail on the head. A too-literal translation. Strange, I've
    been using it for a while now (as in: years), but as far as I remember
    you're to the first one to remark upon it.

    Yes, you use it frequently and already for a long time. I think in
    most cases it was not a problem, because what you meant could be
    'guessed' from the context, or the word was somewhat redundant, i.e. the
    text could still be understood without the word (as I think was the
    case this time)

    And I see (a quick google) that the word I *should* (I think) have used is "support". I'll have to remember that.

    Yes, 'support' suits here. I sometimes use 'substantiate'.

    These are not the only errors in your sentence,

    Pray tell. You might not believe it, but I've got zero problems with being told wrong as part of an attempt to help me better myself (upto a point ofcourse :-) ).

    It's the syntaxis ('zinsbouw') of your sentence. It looks like you
    more or less translated a Dutch sentence word-for-word to English.

    Let me try to change it to how I think it would be 'good'/better:

    [Repeat:]

    Feel free to explain/underbuild why that that face-ID was secure
    than, and than how its still secure now - even with technology
    going forward.

    Feel free to explain/substantiate why face-ID was secure
    then, and how it's still secure now - even with technology
    going forward.

    [N.B. "it's" or "it is", not "its"]

    I deleted "that that", which we Dutch would say ('dat dat', or just
    'dat'), but English speakers won't.

    I also deleted the second 'than'/'then'.

    I think the first 'then' should be changed, because it refers to the
    past, but not in a very clear way. So probably something like this is
    better:

    Feel free to explain/substantiate why face-ID was secure
    in the past, and how it's still secure now - even with [cracking]
    technology going forward.

    but with these errors, the sentence is indeed hard to parse for
    an English 'speaker'. (As a Dutchman, I can quite easily parse this.)

    I can understand that. Ill try to keep the "steenkolen Engels" outof my writings.

    It's indeed a case of "steenkolen Engels" or Louis van Gaal English. :-)

    Thanks for the heads-up.

    You're welcome.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From R.Wieser@21:1/5 to All on Wed May 8 17:36:29 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Frank,

    Feel free to explain/underbuild why that that face-ID was secure
    than, and than how its still secure now - even with technology
    going forward.

    I realized only after posting that I made that error. But are you sure,
    *both* of them ? I though only the first one.

    Yes, both of them. Neither of them is a comparison, which would call
    for 'than'.

    Not a comparision ? Makes sense.

    And (AFAIK), "underbuild" is not an English word/verb. You're
    probably looking for the equivalent of Dutch 'onderbouwen'.

    You hit the nail on the head. A too-literal translation. Strange, I've
    been using it for a while now (as in: years), but as far as I remember
    you're to the first one to remark upon it.

    Yes, you use it frequently and already for a long time.

    I wish I didn't need to (use it that frequently) ... :-\

    I think in most cases it was not a problem, because what you meant
    could be 'guessed' from the context,

    I thought that the same was true here. But as I wrote that line I'm not
    really the one who should be judging it in that regard ("Wij van WC-Eend
    ...").

    And I see (a quick google) that the word I *should* (I think) have used
    is "support". I'll have to remember that.

    Yes, 'support' suits here. I sometimes use 'substantiate'.

    Substanciate. That sounds more like what I'm normally after. "Give
    substance".

    It's the syntaxis ('zinsbouw') of your sentence. It looks like you
    more or less translated a Dutch sentence word-for-word to English.

    D*mn. I though that with all my book reading I would have absorbed the
    syntax rules from them a bit better. :-|

    These are not the only errors in your sentence,

    Pray tell. [snip]

    Let me try to change it to how I think it would be 'good'/better:

    Feel free to explain/substantiate why face-ID was secure
    then, and how it's still secure now - even with technology
    going forward.

    I'm trying to get myself to disagree with you, but I can't. :-)

    I deleted "that that", which we Dutch would say ('dat dat', or
    just 'dat'), but English speakers won't.

    It was an attempt to make it clear I was talking about the Face-ID of that
    time (and not the current version).

    I also deleted the second 'than'/'then'.

    I noticed. There I tried to indicate a sequence : first do {this}, and only /after/ thats done do {that}.

    I think the first 'then' should be changed, because it refers to the
    past, but not in a very clear way. So probably something like this is
    better:

    Feel free to explain/substantiate why face-ID was secure
    in the past, and how it's still secure now - even with [cracking]
    technology going forward.

    Yes, the sentence certainly flows better.

    But you changed the subject with that "[cracking]" part. I really tried to refer to the Face-ID technology - as I assume it has, just as the "cracking" methods, also progressed.

    but with these errors,

    Truly errors ? As in syntax errors ? Man ... :-(

    Thanks for the explanation. I appreciate it.

    now the only thing I need to do is to remember to apply them ...

    Regards,
    Rudy Wieser

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to Arno Welzel on Wed May 8 12:09:01 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-08 05:49, Arno Welzel wrote:
    R.Wieser, 2024-05-07 19:07:

    [...]
    And as the intended victim is showing off his key every moment of the day I >> cannot escape the feeling that a few pictures (from diferent angles) would >> be enough for a 'puter (or a person) to construct a 3D model from it. Take >> few more pictures with an heat (IR?) camera and you likely have the
    mentioned heatmap for that face too.

    Did I forget anything ?

    No, I didn't say it would be easy. But I don't think its impossible either. >> Just, for the first few times(!), a lengthy and costly job.

    *Nothing* is impossible to break. It is *always* a question of how much effort is needed to break a thing. If anyone claims to have an
    "unbreakable" solution he lies.

    The problem is nitwits who suggest that because some YouTuber went out
    of their way to show a means to break the fingerprint feature of
    iPhones, that it is something anyone can do with little effort - when
    the truth is it is a hit or miss scheme that takes quite a bit of effort
    not to mention improbable steps such as lifting prints in the first
    place and having easy access to the target phone.

    Then there's the suggestion that one can construct a 3D face using a 3D
    printer (very plausible given a stereoscopic set of photos) PLUS a heat
    map embedded on that face that matches close enough to that taken by the
    iPhone sensor. (extremely non-likely).

    So - impossible? No. Likely? Very much no.

    --
    “Patriotism is when love of your own people comes first;
    nationalism, when hate for people other than your own comes first.â€
    - Charles de Gaulle.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to R.Wieser on Wed May 8 16:17:53 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-08, R.Wieser <address@is.invalid> wrote:

    Not a comparision ?

    Again, in English you do not place a space between the last word of a
    sentence and the ending punctuation. That includes question marks.

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to Arno Welzel on Wed May 8 16:22:42 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-08, Arno Welzel <usenet@arnowelzel.de> wrote:
    R.Wieser, 2024-05-07 19:07:

    [...]
    And as the intended victim is showing off his key every moment of the
    day I cannot escape the feeling that a few pictures (from diferent
    angles) would be enough for a 'puter (or a person) to construct a 3D
    model from it. Take few more pictures with an heat (IR?) camera and
    you likely have the mentioned heatmap for that face too.

    Did I forget anything ?

    No, I didn't say it would be easy. But I don't think its impossible
    either. Just, for the first few times(!), a lengthy and costly job.

    *Nothing* is impossible to break. It is *always* a question of how
    much effort is needed to break a thing. If anyone claims to have an "unbreakable" solution he lies.

    I haven't seen anyone here make that claim - just a few trolls rehashing previous claims that Face ID is supposedly "insecure" just because
    someone could possibly construct a 3D model of someone else's face and
    somehow generate a heat map to lay over it in order to fool Face ID. Of
    course they haven't addressed Face ID's Attention Aware feature which
    would also have to be defeated. All of it is pie-in-the-sky and not
    easily achievable though. In reality, this isn't something most people
    who use Face ID worry about happening.

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan@21:1/5 to The Real Bev on Wed May 8 09:39:19 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-08 09:05, The Real Bev wrote:
    On 5/8/24 6:53 AM, Frank Slootweg wrote:

       I deleted "that that", which we Dutch would say ('dat dat', or just
    'dat'), but English speakers won't.

    Yes we do, or at least I do.  "I believe that that is the truth."  Carry on.



    Jim where John had had had had had had had had had had had a better
    effect on the teacher.

    😎

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to The Real Bev on Wed May 8 12:57:56 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-08 12:05, The Real Bev wrote:
    On 5/8/24 6:53 AM, Frank Slootweg wrote:

       I deleted "that that", which we Dutch would say ('dat dat', or just
    'dat'), but English speakers won't.

    Yes we do, or at least I do.  "I believe that that is the truth."  Carry on.

    I've been ribbed for, " ... where we do do enhanced processing ..."

    --
    “Patriotism is when love of your own people comes first;
    nationalism, when hate for people other than your own comes first.â€
    - Charles de Gaulle.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Frank Slootweg@21:1/5 to R.Wieser on Wed May 8 17:37:27 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    R.Wieser <address@is.invalid> wrote:
    Frank,

    [Lots deleted.]

    I think the first 'then' should be changed, because it refers to the past, but not in a very clear way. So probably something like this is better:

    Feel free to explain/substantiate why face-ID was secure
    in the past, and how it's still secure now - even with [cracking] technology going forward.

    Yes, the sentence certainly flows better.

    But you changed the subject with that "[cracking]" part. I really tried to refer to the Face-ID technology - as I assume it has, just as the "cracking" methods, also progressed.

    Apparently I guessed wrong. I thought you were referring to the
    "cracking" methods, because AFAIK, Apple's Face-ID technology hasn't
    changed all that much. But I could be (totally) wrong about that, as
    I've not be following/studying that technology over time.

    but with these errors,

    Truly errors ? As in syntax errors ? Man ... :-(

    Nah! Your keyboard just doesn't correctly process what you type! :-)

    Thanks for the explanation. I appreciate it.

    You're again/still welcome.

    now the only thing I need to do is to remember to apply them ...

    Don't worry, I have my share of common - mostly spelling - errors and
    you should see what some of the native English 'speakers' emit without
    even blinking!

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Frank Slootweg@21:1/5 to The Real Bev on Wed May 8 17:23:21 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    In comp.mobile.android The Real Bev <bashley101@gmail.com> wrote:
    On 5/8/24 6:53 AM, Frank Slootweg wrote:

    I deleted "that that", which we Dutch would say ('dat dat', or just 'dat'), but English speakers won't.

    Yes we do, or at least I do. "I believe that that is the truth." Carry on.

    I *said* "English speakers", didn't I!? :-)

    But seriously, in the relevant context, at most it would be a single
    'that':

    [Edited by me:]

    Feel free to explain/substantiate why [that] that face-ID was secure
    then, and [then] how it's still secure now - even with technology
    going forward.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From R.Wieser@21:1/5 to All on Wed May 8 20:26:21 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Frank,

    But you changed the subject with that "[cracking]" part. I really tried
    to refer to the Face-ID technology - as I assume it has, just as the
    "cracking" methods, also progressed.

    Apparently I guessed wrong. I thought you were referring to the
    "cracking" methods,

    I was trying to let Alan (Browne) know that I wasn't trying to get him to defend an old Face-ID method against nowerdays technology. I may be an ass
    at times, but that would be dishonest.

    Apple's Face-ID technology hasn't changed all that much.

    I wouldn't know. Heck, I do not even know how old it is.

    But I could be (totally) wrong about that, as I've not be
    following/studying that technology over time.

    I've not been following it either, for several reasons. One of them I
    already mentioned, another being the price of those IThingamagotchies. In
    cold hard cash as well as other stuff.

    now the only thing I need to do is to remember to apply them ...

    Don't worry, I have my share of common - mostly spelling - errors and
    you should see what some of the native English 'speakers' emit without
    even blinking!

    Phew. :-) And thanks.

    Regards,
    Rudy Wieser

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to Chris on Wed May 8 15:31:00 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-08 15:16, Chris wrote:
    On 08/05/2024 17:39, Alan wrote:
    On 2024-05-08 09:05, The Real Bev wrote:
    On 5/8/24 6:53 AM, Frank Slootweg wrote:

       I deleted "that that", which we Dutch would say ('dat dat', or just >>>> 'dat'), but English speakers won't.

    Yes we do, or at least I do.  "I believe that that is the truth."
    Carry on.



    Jim where John had had had had had had had had had had had a better
    effect on the teacher.

    😎

    Or picture a sign painter redoing the sign at the George and Dragon pub.
    The publican comes out to see the progress and spots a problem: "There's
    too much space between George and And and And and Dragon."

    Ah yes, I read that in the The Guardian.

    --
    “Patriotism is when love of your own people comes first;
    nationalism, when hate for people other than your own comes first.â€
    - Charles de Gaulle.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Hank Rogers@21:1/5 to The Real Bev on Wed May 8 16:38:29 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    The Real Bev wrote:
    On 5/8/24 10:23 AM, Frank Slootweg wrote:
    In comp.mobile.android The Real Bev <bashley101@gmail.com> wrote:
    On 5/8/24 6:53 AM, Frank Slootweg wrote:

       I deleted "that that", which we Dutch would say ('dat dat', or just >>> > 'dat'), but English speakers won't.

    Yes we do, or at least I do.  "I believe that that is the truth."  Carry >>> on.

       I *said* "English speakers", didn't I!? :-)

    All my life, and certainly in the top 1% -- I've been tested!

       But seriously, in the relevant context, at most it would be a single
    'that':

    No.  People frequently leave out the 'that' in sentences like "I'm sure he did it" but I regard that as sloppy at best.  If it occasionally requires double thats, so be it.

    I would like to read an explanation of Alan's "Jim where John had had had
    had had had had had had had had a better effect on the teacher." though,


    Shouldn't we all be squabbling about apple minutia?

    After all that's the purpose of this group.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan@21:1/5 to The Real Bev on Wed May 8 16:21:03 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-08 12:10, The Real Bev wrote:
    On 5/8/24 10:23 AM, Frank Slootweg wrote:
    In comp.mobile.android The Real Bev <bashley101@gmail.com> wrote:
    On 5/8/24 6:53 AM, Frank Slootweg wrote:

        I deleted "that that", which we Dutch would say ('dat dat', or just >>> > 'dat'), but English speakers won't.

    Yes we do, or at least I do.  "I believe that that is the truth."
    Carry on.

       I *said* "English speakers", didn't I!? :-)

    All my life, and certainly in the top 1% -- I've been tested!

       But seriously, in the relevant context, at most it would be a single
    'that':

    No.  People frequently leave out the 'that' in sentences like "I'm sure
    he did it" but I regard that as sloppy at best.  If it occasionally
    requires double thats, so be it.

    I would like to read an explanation of Alan's "Jim where John had had
    had had had had had had had had had a better effect on the teacher."
    though,


    I'll give everyone a little longer to ruminate on it...

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Carlos E.R.@21:1/5 to Alan on Thu May 9 14:01:13 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-09 01:21, Alan wrote:
    On 2024-05-08 12:10, The Real Bev wrote:
    On 5/8/24 10:23 AM, Frank Slootweg wrote:
    In comp.mobile.android The Real Bev <bashley101@gmail.com> wrote:
    On 5/8/24 6:53 AM, Frank Slootweg wrote:

        I deleted "that that", which we Dutch would say ('dat dat', or >>>> just
    'dat'), but English speakers won't.

    Yes we do, or at least I do.  "I believe that that is the truth."
    Carry on.

       I *said* "English speakers", didn't I!? :-)

    All my life, and certainly in the top 1% -- I've been tested!

       But seriously, in the relevant context, at most it would be a single >>> 'that':

    No.  People frequently leave out the 'that' in sentences like "I'm
    sure he did it" but I regard that as sloppy at best.  If it
    occasionally requires double thats, so be it.

    I would like to read an explanation of Alan's "Jim where John had had
    had had had had had had had had had a better effect on the teacher."
    though,


    I'll give everyone a little longer to ruminate on it...

    I gave up on it on first sight.

    --
    Cheers, Carlos.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan@21:1/5 to Carlos E.R. on Thu May 9 08:57:34 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-09 05:01, Carlos E.R. wrote:
    On 2024-05-09 01:21, Alan wrote:
    On 2024-05-08 12:10, The Real Bev wrote:
    On 5/8/24 10:23 AM, Frank Slootweg wrote:
    In comp.mobile.android The Real Bev <bashley101@gmail.com> wrote:
    On 5/8/24 6:53 AM, Frank Slootweg wrote:

        I deleted "that that", which we Dutch would say ('dat dat', or >>>>> just
    'dat'), but English speakers won't.

    Yes we do, or at least I do.  "I believe that that is the truth."
    Carry on.

       I *said* "English speakers", didn't I!? :-)

    All my life, and certainly in the top 1% -- I've been tested!

       But seriously, in the relevant context, at most it would be a single >>>> 'that':

    No.  People frequently leave out the 'that' in sentences like "I'm
    sure he did it" but I regard that as sloppy at best.  If it
    occasionally requires double thats, so be it.

    I would like to read an explanation of Alan's "Jim where John had had
    had had had had had had had had had a better effect on the teacher."
    though,


    I'll give everyone a little longer to ruminate on it...

    I gave up on it on first sight.


    Alright, alright.

    Jim, where John had had "had", had had "had had". "Had had" had had a
    better effect on the teacher.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan@21:1/5 to The Real Bev on Thu May 9 09:32:20 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-09 09:13, The Real Bev wrote:
    On 5/9/24 8:57 AM, Alan wrote:
    On 2024-05-09 05:01, Carlos E.R. wrote:
    On 2024-05-09 01:21, Alan wrote:
    On 2024-05-08 12:10, The Real Bev wrote:
    On 5/8/24 10:23 AM, Frank Slootweg wrote:
    In comp.mobile.android The Real Bev <bashley101@gmail.com> wrote: >>>>>>> On 5/8/24 6:53 AM, Frank Slootweg wrote:

        I deleted "that that", which we Dutch would say ('dat dat', >>>>>>> or just
    'dat'), but English speakers won't.

    Yes we do, or at least I do.  "I believe that that is the truth." >>>>>>> Carry on.

       I *said* "English speakers", didn't I!? :-)

    All my life, and certainly in the top 1% -- I've been tested!

       But seriously, in the relevant context, at most it would be a >>>>>> single
    'that':

    No.  People frequently leave out the 'that' in sentences like "I'm
    sure he did it" but I regard that as sloppy at best.  If it
    occasionally requires double thats, so be it.

    I would like to read an explanation of Alan's "Jim where John had
    had had had had had had had had had had a better effect on the
    teacher." though,

    I'll give everyone a little longer to ruminate on it...

    I gave up on it on first sight.

    Alright, alright.

    This is not a word.  In the same category as 'irregardless'.  Ignorant
    and sloppy.

    Who appointed you grammarian to the internet?

    Is "already" a word? "Always"? Maybe "already" is almost a word?

    :-)


    Jim, where John had had "had", had had "had had". "Had had" had had a
    better effect on the teacher.

    OK.  Punctuation, at least periods, should have been included.

    No. That was the POINT: to find how to punctuate it.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to The Real Bev on Thu May 9 16:27:47 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-09, The Real Bev <bashley101@gmail.com> wrote:
    On 5/9/24 8:57 AM, Alan wrote:

    Alright, alright.

    This is not a word.

    It's certainly an informal and nonstandard form of "all right", but it
    is definitely a word.

    Merriam-Webster says:
    <https://www.merriam-webster.com/dictionary/alright>

    ---
    alright - adverb or adjective
    al·right (ˌ)ȯl-ˈrīt ˈȯl-ˌrīt
    Synonyms of alright
    : ALL RIGHT
    If people stay strong and keep pushing we'll be alright.
    —Keith Ellison

    Alright, I give in.
    —Sallie Tisdale

    Alright already, get in the squad car and solve the darn crime.
    —Ken Tucker

    It's cheap, alright.
    —Chris Hodenfield

    all right or alright?: Usage Guide

    Although the spelling alright is more than a century and a half old,
    some critics have insisted alright is all wrong. Nevertheless, it has
    its defenders and its users, who perhaps have been influenced by analogy
    with altogether and already. Alright is less common than all right but
    is frequently found in informal writing and fictional dialogue.

    Starting at a slower pace is perfectly alright.
    —Alia Haley

    "Alright, it is a bargain. I will help you."
    —Harold Bell Wright

    It is sometimes also used in more formal writing.

    The first two years of the medical school were alright.
  • From Alan@21:1/5 to The Real Bev on Thu May 9 11:24:57 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-09 11:07, The Real Bev wrote:
    On 5/9/24 9:32 AM, Alan wrote:
    On 2024-05-09 09:13, The Real Bev wrote:
    On 5/9/24 8:57 AM, Alan wrote:
    On 2024-05-09 05:01, Carlos E.R. wrote:
    On 2024-05-09 01:21, Alan wrote:
    On 2024-05-08 12:10, The Real Bev wrote:
    On 5/8/24 10:23 AM, Frank Slootweg wrote:
    In comp.mobile.android The Real Bev <bashley101@gmail.com> wrote: >>>>>>>>> On 5/8/24 6:53 AM, Frank Slootweg wrote:

        I deleted "that that", which we Dutch would say ('dat >>>>>>>>> dat', or just
    'dat'), but English speakers won't.

    Yes we do, or at least I do.  "I believe that that is the
    truth." Carry on.

       I *said* "English speakers", didn't I!? :-)

    All my life, and certainly in the top 1% -- I've been tested!

       But seriously, in the relevant context, at most it would be a >>>>>>>> single
    'that':

    No.  People frequently leave out the 'that' in sentences like
    "I'm sure he did it" but I regard that as sloppy at best.  If it >>>>>>> occasionally requires double thats, so be it.

    I would like to read an explanation of Alan's "Jim where John had >>>>>>> had had had had had had had had had had a better effect on the
    teacher." though,

    I'll give everyone a little longer to ruminate on it...

    I gave up on it on first sight.

    Alright, alright.

    This is not a word.  In the same category as 'irregardless'.
    Ignorant and sloppy.

    Who appointed you grammarian to the internet?

    I did.  Weren't you paying attention?  Please try to keep up.

    Is "already" a word? "Always"? Maybe "already" is almost a word?

    I agree, there are a lot of proper al- words.  Nonetheless, during my literacy the expression has been "all right" and "alright" appeared at
    about the same time as thumb-spelling, indicating either laziness or ignorance.

    Bite me.

    Language evolves. Learn to deal with it. "Already" came straight from
    "all ready", and the meaning is not subtly different.

    Similarly "alright" doesn't mean precisely what "all right" means.


    :-)


    Jim, where John had had "had", had had "had had". "Had had" had had a
    better effect on the teacher.

    OK.  Punctuation, at least periods, should have been included.

    No. That was the POINT: to find how to punctuate it.

    OK, I concede.  I failed miserably.  It happens now and again.

    I'm sure it does.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andrew@21:1/5 to Jolly Roger on Thu May 9 23:24:13 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Jolly Roger wrote on 8 May 2024 16:22:42 GMT :

    In reality, this isn't something most people
    who use Face ID worry about happening.

    These marketing gimmicks make iPhone uses only *feel* safe, because the
    truth is the iPhone is by far the most exploited smartphone on the planet.

    https://www.cisa.gov/known-exploited-vulnerabilities-catalog

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan@21:1/5 to Andrew on Thu May 9 17:28:59 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-09 16:24, Andrew wrote:
    Jolly Roger wrote on 8 May 2024 16:22:42 GMT :

    In reality, this isn't something most people
    who use Face ID worry about happening.

    These marketing gimmicks make iPhone uses only *feel* safe, because the
    truth is the iPhone is by far the most exploited smartphone on the planet.

    https://www.cisa.gov/known-exploited-vulnerabilities-catalog

    Are locks on your front door just "marketing gimmicks" because they can
    be defeated, Arlen?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan@21:1/5 to The Real Bev on Thu May 9 17:43:00 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-09 17:31, The Real Bev wrote:
    On 5/9/24 11:24 AM, Alan wrote:
    On 2024-05-09 11:07, The Real Bev wrote:
    On 5/9/24 9:32 AM, Alan wrote:
    On 2024-05-09 09:13, The Real Bev wrote:
    On 5/9/24 8:57 AM, Alan wrote:

    Alright, alright.

    This is not a word.  In the same category as 'irregardless'.
    Ignorant and sloppy.

    Who appointed you grammarian to the internet?

    I did.  Weren't you paying attention?  Please try to keep up.

    Is "already" a word? "Always"? Maybe "already" is almost a word?

    I agree, there are a lot of proper al- words.  Nonetheless, during my
    literacy the expression has been "all right" and "alright" appeared
    at about the same time as thumb-spelling, indicating either laziness
    or ignorance.

    Bite me.

    Language evolves. Learn to deal with it. "Already" came straight from
    "all ready", and the meaning is not subtly different.

    Similarly "alright" doesn't mean precisely what "all right" means.

    No, it means EXACTLY the same.  There's a difference between evolution
    and sloppiness/ignorance.


    No. It doesn't.

    I say that something is "all ready", it means that it is "ready in every respect".

    "Already" clearly means:

    'before or by now or the time in question'

    Similarly, "all right" means "correct in ever respect", and while
    "alright" is closer in meaning, it is clearly used to ask whether
    something is just ACCEPTABLE as opposed to the former.

    Furthermore:

    'The merging of all and right to form the one-word spelling alright is
    first recorded toward the end of the 19th century'

    So you're a little behind the times, my love.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andrew@21:1/5 to Alan Browne on Fri May 10 01:38:36 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Alan Browne wrote on Tue, 7 May 2024 08:29:18 -0400 :

    You brought up several examples of your utter lack of understanding of
    how Face ID works.

    Biometric marketing gimmicks are expressly designed to make gullible but ignorant iPhone users *feel* safe, because the factual truth is the iPhone
    is (and always was) by far the most exploited smartphone on the planet.

    https://www.cisa.gov/known-exploited-vulnerabilities-catalog

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andrew@21:1/5 to Paul on Fri May 10 01:39:04 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Paul wrote on Mon, 6 May 2024 21:44:52 -0400 :

    The Intel projects a pattern too.

    https://dev.intelrealsense.com/docs/projectors


    Biometric marketing gimmicks are expressly designed to make gullible but ignorant iPhone users *feel* safe, because the factual truth is the iPhone
    is (and always was) by far the most exploited smartphone on the planet.

    https://www.cisa.gov/known-exploited-vulnerabilities-catalog

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan@21:1/5 to The Real Bev on Fri May 10 09:58:13 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-09 18:06, The Real Bev wrote:
    On 5/9/24 5:43 PM, Alan wrote:
    On 2024-05-09 17:31, The Real Bev wrote:
    On 5/9/24 11:24 AM, Alan wrote:
    On 2024-05-09 11:07, The Real Bev wrote:
    On 5/9/24 9:32 AM, Alan wrote:
    On 2024-05-09 09:13, The Real Bev wrote:
    On 5/9/24 8:57 AM, Alan wrote:

    Alright, alright.

    This is not a word.  In the same category as 'irregardless'.
    Ignorant and sloppy.

    Who appointed you grammarian to the internet?

    I did.  Weren't you paying attention?  Please try to keep up.

    Is "already" a word? "Always"? Maybe "already" is almost a word?

    I agree, there are a lot of proper al- words.  Nonetheless, during
    my literacy the expression has been "all right" and "alright"
    appeared at about the same time as thumb-spelling, indicating
    either laziness or ignorance.

    Bite me.

    Language evolves. Learn to deal with it. "Already" came straight from
    "all ready", and the meaning is not subtly different.

    Similarly "alright" doesn't mean precisely what "all right" means.

    No, it means EXACTLY the same.  There's a difference between
    evolution and sloppiness/ignorance.


    No. It doesn't.

    I say that something is "all ready", it means that it is "ready in every
    respect".

    "Already" clearly means:

    'before or by now or the time in question'

    Similarly, "all right" means "correct in ever respect", and while
    "alright" is closer in meaning, it is clearly used to ask whether
    something is just ACCEPTABLE as opposed to the former.

    "All right" SHOULD mean everything ship-shape and Bristol fashion, but
    it doesn't.  It's just assent.  Similar to okay (OK), but different.

    Language evolves. Deal with it.

    "All right" and "alright" have different meanings.

    Deal with that too.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jan K.@21:1/5 to All on Fri May 10 19:24:02 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    W Fri, 10 May 2024 19:16:48 +0200, Bill Powell napisal:

    These marketing gimmicks make iPhone uses only *feel* safe, because the
    truth is the iPhone is by far the most exploited smartphone on the planet. >>>
    https://www.cisa.gov/known-exploited-vulnerabilities-catalog

    Are locks on your front door just "marketing gimmicks" because they can
    be defeated, Arlen?

    You misunderstood. If you understood, you would have asked "Are BIOMETRIC locks on your front door just marketing gimmicks?" (which they would be).

    Do they even make biometric locks for an average homeowner's front door?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Bill Powell@21:1/5 to Alan on Fri May 10 19:16:48 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On Thu, 9 May 2024 17:28:59 -0700, Alan wrote:

    Jolly Roger wrote on 8 May 2024 16:22:42 GMT :

    In reality, this isn't something most people
    who use Face ID worry about happening.

    These marketing gimmicks make iPhone uses only *feel* safe, because the
    truth is the iPhone is by far the most exploited smartphone on the planet. >>
    https://www.cisa.gov/known-exploited-vulnerabilities-catalog

    Are locks on your front door just "marketing gimmicks" because they can
    be defeated, Arlen?

    You misunderstood. If you understood, you would have asked "Are BIOMETRIC
    locks on your front door just marketing gimmicks?" (which they would be).

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Larry Wolff@21:1/5 to Jan K. on Fri May 10 13:51:04 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 5/10/2024 1:24 PM, Jan K. wrote:

    These marketing gimmicks make iPhone uses only *feel* safe, because the >>>> truth is the iPhone is by far the most exploited smartphone on the planet. >>>>
    https://www.cisa.gov/known-exploited-vulnerabilities-catalog

    Are locks on your front door just "marketing gimmicks" because they can
    be defeated, Arlen?

    You misunderstood. If you understood, you would have asked "Are BIOMETRIC
    locks on your front door just marketing gimmicks?" (which they would be).

    Do they even make biometric locks for an average homeowner's front door?

    Apple would.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan@21:1/5 to Bill Powell on Fri May 10 11:34:49 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-10 10:16, Bill Powell wrote:
    On Thu, 9 May 2024 17:28:59 -0700, Alan wrote:

    Jolly Roger wrote on 8 May 2024 16:22:42 GMT :

    In reality, this isn't something most people
    who use Face ID worry about happening.

    These marketing gimmicks make iPhone uses only *feel* safe, because the
    truth is the iPhone is by far the most exploited smartphone on the
    planet.

    https://www.cisa.gov/known-exploited-vulnerabilities-catalog

    Are locks on your front door just "marketing gimmicks" because they
    can be defeated, Arlen?

    You misunderstood. If you understood, you would have asked "Are BIOMETRIC locks on your front door just marketing gimmicks?" (which they would be).

    I understood just fine.

    You misunderstand what an "analogy" is.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to Larry Wolff on Fri May 10 18:30:28 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-10, Larry Wolff <larrywolff@larrywolff.net> wrote:
    On 5/10/2024 1:24 PM, Jan K. wrote:

    These marketing gimmicks make iPhone uses only *feel* safe,
    because the truth is the iPhone is by far the most exploited
    smartphone on the planet.

    https://www.cisa.gov/known-exploited-vulnerabilities-catalog

    Are locks on your front door just "marketing gimmicks" because they
    can be defeated, Arlen?

    You misunderstood. If you understood, you would have asked "Are
    BIOMETRIC locks on your front door just marketing gimmicks?" (which
    they would be).

    Do they even make biometric locks for an average homeowner's front
    door?

    Apple would.

    Apple doesn't.

    Smart door lock manufacturers do, and unlike iPhones with Touch ID, they
    are often easily compromised.

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Carlos E.R.@21:1/5 to Jan K. on Fri May 10 22:40:49 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-10 19:24, Jan K. wrote:
    W Fri, 10 May 2024 19:16:48 +0200, Bill Powell napisal:

    These marketing gimmicks make iPhone uses only *feel* safe, because the >>>> truth is the iPhone is by far the most exploited smartphone on the
    planet.

    https://www.cisa.gov/known-exploited-vulnerabilities-catalog

    Are locks on your front door just "marketing gimmicks" because they
    can be defeated, Arlen?

    You misunderstood. If you understood, you would have asked "Are BIOMETRIC
    locks on your front door just marketing gimmicks?" (which they would be).

    Do they even make biometric locks for an average homeowner's front door?

    Maybe.

    I know that Securitas Direct is airing commercials about an electronic
    lock controlled with the phone, possibly with their app. The phone can
    be open with "biometrics", so the lock responds to biometrics, in a
    manner of speaking...

    :-)

    I haven't looked in detail at their offering, anyway.


    --
    Cheers, Carlos.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan@21:1/5 to Bill Powell on Fri May 10 13:47:12 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-10 10:16, Bill Powell wrote:
    On Thu, 9 May 2024 17:28:59 -0700, Alan wrote:

    Jolly Roger wrote on 8 May 2024 16:22:42 GMT :

    In reality, this isn't something most people
    who use Face ID worry about happening.

    These marketing gimmicks make iPhone uses only *feel* safe, because the
    truth is the iPhone is by far the most exploited smartphone on the
    planet.

    https://www.cisa.gov/known-exploited-vulnerabilities-catalog

    Are locks on your front door just "marketing gimmicks" because they
    can be defeated, Arlen?

    You misunderstood. If you understood, you would have asked "Are BIOMETRIC locks on your front door just marketing gimmicks?" (which they would be).

    What you don't understand is the differences between the use cases.

    A normal lock on a front door is sufficiently convenient for almost
    everyone...

    ...because you're not expecting to unlock the door every few minutes.

    Smartphones are different.

    You pick up your smartphone and you want to start using it from a locked
    state, what... ...30, 50... ...maybe as many as 100 times a day.

    So a phone that unlocks with your finger print or face is suddenly much
    more convenient that one that requires you to enter a passcode.

    Smartphones have information on them that you don't want stolen, and
    they, and despite what that idiot, Arlen, claims, theft or loss of a
    phone doesn't just happen to people in slums.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andrew@21:1/5 to Jolly Roger on Fri May 10 21:34:56 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Jolly Roger wrote on 8 May 2024 02:08:45 GMT :

    More like a bad allegory. Nobody here has claimed Face ID is the most
    secure thing on the planet.

    It's even worse when you learn iOS is the most exploited phone OS in
    history. https://www.cisa.gov/known-exploited-vulnerabilities-catalog

    *No phone has ever had more zero-day holes than the iPhone.*

    Which is why the phrase "To own an iPhone is to already be hacked" is true.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan@21:1/5 to Andrew on Fri May 10 14:55:16 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-10 14:34, Andrew wrote:
    Jolly Roger wrote on 8 May 2024 02:08:45 GMT :

    More like a bad allegory. Nobody here has claimed Face ID is the most
    secure thing on the planet.

    It's even worse when you learn iOS is the most exploited phone OS in
    history. https://www.cisa.gov/known-exploited-vulnerabilities-catalog

    *No phone has ever had more zero-day holes than the iPhone.*

    Which is why the phrase "To own an iPhone is to already be hacked" is true.

    LOL!

    You are a zealot, Arlen!

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to Andrew on Fri May 10 22:21:27 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-10, Andrew <andrew@spam.net> wrote:
    Jolly Roger wrote on 8 May 2024 02:08:45 GMT :

    More like a bad allegory. Nobody here has claimed Face ID is the most
    secure thing on the planet.

    It's even worse when you learn iOS is the blah blah blah

    You're a broken record. Literally useless.

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andrew@21:1/5 to Jolly Roger on Sat May 11 04:08:11 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Jolly Roger wrote on 10 May 2024 22:21:27 GMT :

    You're a broken record. Literally useless.

    And yet, it's a fact the iPhone is the most exploited phone in history. https://www.cisa.gov/known-exploited-vulnerabilities-catalog

    No phone has more zero-day holes than the iPhone, Jolly Roger.

    Since you get all your information about Apple only from Apple
    advertisements, you're not aware of any of the facts about Apple.

    All you know about is Apple's (brilliant) biometric marketing gimmicks.

    Apple's advertisements make its gullible users *feel safe*, as Apple will
    never tell you in its ads that to own an iPhone is to already be hacked.

    Especially given Apple is the only common consumer operating system vendor
    who only supports a single release at any one time. Yes, ONE RELEASE ONLY!

    https://screenrant.com/apple-product-security-update-lifespan/ https://hothardware.com/news/apple-admits-only-fully-patches-security-flaws-in-latest-os-releases
    https://arstechnica.com/gadgets/2022/10/apple-clarifies-security-update-policy-only-the-latest-oses-are-fully-patched/

    You won't find the fact Apple's support is the most limited in the industry
    in any of Apple's (rather brilliant) advertisements, now will you?

    All you'll find in Apple advertisements are Apple's fantastic new emoji!

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to Andrew on Sat May 11 04:38:22 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-11, Andrew <andrew@spam.net> wrote:
    Jolly Roger wrote on 10 May 2024 22:21:27 GMT :

    You're a broken record. Literally useless.

    And yet, [more broken record bullshit]

    It's literally all little Arlen has at his disposal. His trolls are
    *that* weak and feeble. Sad.

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andrew@21:1/5 to Jolly Roger on Sat May 11 13:58:25 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Jolly Roger wrote on 11 May 2024 04:38:22 GMT :

    His trolls are *that* weak and feeble.

    Notice that the Apple religious zealots call all facts about Apple to be trolls. Why is that? They don't say that on the adult OS newsgroups.

    Only on Apple newsgroup is the fact that the iPhone is the most exploited smartphone on the planet called a troll (which Apple never tells them). https://www.cisa.gov/known-exploited-vulnerabilities-catalog

    Only on an Apple operating system is the fact Apple has the most limited operating system support in the industry called a troll (which Apple was recently forced by the security industry to publicly disclose). https://support.apple.com/en-ca/guide/deployment/depc4c80847a/web

    If you told a fact on the adult operating systems newsgroups (even a fact
    that puts the OS maker in a bad light) nobody calls it a troll.

    But if you tell a fact on the childish Apple newsgroups, they do.
    Why do you think that is the case?
    --
    HINT: Apple religious zealots will defend Apple to the death, no matter
    what and yet, they're herd animals who don't know anything about iOS>

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?J=C3=B6rg_Lorenz?=@21:1/5 to Jolly Roger on Sat May 11 17:43:18 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 11.05.24 06:38, Jolly Roger wrote:
    On 2024-05-11, Andrew <andrew@spam.net> wrote:
    Jolly Roger wrote on 10 May 2024 22:21:27 GMT :

    You're a broken record. Literally useless.

    And yet, [more broken record bullshit]

    It's literally all little Arlen has at his disposal. His trolls are
    *that* weak and feeble. Sad.

    *You* are the Troll, little Roger. Why are still feeding this brain dead
    idiot Arlen after so many years? Are you bored?


    --
    "Alea iacta est." (Julius Caesar)

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to Andrew on Sat May 11 15:51:55 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-11, Andrew <andrew@spam.net> wrote:
    Jolly Roger wrote on 11 May 2024 04:38:22 GMT :

    His trolls are *that* weak and feeble.

    Notice that the Apple religious zealots

    Notice that little Arlen calls anyone who dares to stand up to his
    bullshit "Apple religious zealots" - all while little Arlen exhibits
    true zealotry against anything Apple related.

    Why do you think that is the case?

    Because little Arlen is in fact a zealot.

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to hugybear@gmx.net on Sat May 11 15:53:48 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-11, Jörg Lorenz <hugybear@gmx.net> wrote:
    On 11.05.24 06:38, Jolly Roger wrote:
    On 2024-05-11, Andrew <andrew@spam.net> wrote:
    Jolly Roger wrote on 10 May 2024 22:21:27 GMT :

    You're a broken record. Literally useless.

    And yet, [more broken record bullshit]

    It's literally all little Arlen has at his disposal. His trolls are
    *that* weak and feeble. Sad.

    *You* are the Troll, little Roger.

    "Standing up to bullies makes *you* the bully!", exclaimed Jörg...

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andrew@21:1/5 to Jolly Roger on Sat May 11 16:59:44 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Jolly Roger wrote on 11 May 2024 15:51:55 GMT :

    "Apple religious zealots"

    The facts are what you Apple religious zealot nutcases refuse to believe.
    https://screenrant.com/apple-product-security-update-lifespan/
    https://hothardware.com/news/apple-admits-only-fully-patches-security-flaws-in-latest-os-releases
    https://arstechnica.com/gadgets/2022/10/apple-clarifies-security-update-policy-only-the-latest-oses-are-fully-patched/

    *The iPhone has the worst full OS support in history*

    What you religious herd animal nutjobs hate, JR, are the facts.
    https://www.cisa.gov/known-exploited-vulnerabilities-catalog

    *The iPhone is the most exploited phone in history*

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andrew@21:1/5 to Jolly Roger on Sat May 11 20:00:56 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Jolly Roger wrote on 11 May 2024 19:39:21 GMT :

    YAWN

    Notice you can't refute the facts nor that you lied for years about them.

    *The iPhone has the worst full OS support in the history of phones*
    *As a result, the iPhone is the most exploited phone in history*

    It's no longer shocking Apple religious zealots know nothing about iOS.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to Andrew on Sat May 11 19:39:21 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-11, Andrew <andrew@spam.net> wrote:
    Jolly Roger wrote on 11 May 2024 15:51:55 GMT :

    "Apple religious zealots"

    The facts [more repitious deflection and trolling]

    YAWN

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to Andrew on Sat May 11 21:21:17 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    On 2024-05-11, Andrew <andrew@spam.net> wrote:
    Jolly Roger wrote on 11 May 2024 19:39:21 GMT :

    YAWN

    Notice

    Notice Arlen deflects constantly and has nothing but trolls to offer.

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andrew@21:1/5 to Jolly Roger on Sat May 11 22:10:29 2024
    XPost: misc.phone.mobile.iphone, comp.mobile.android

    Jolly Roger wrote on 11 May 2024 21:21:17 GMT :

    has nothing but trolls to offer.

    I feel sorry for people like you, Jolly Roger, because your entire life
    you've been told that you're stupid (which is why you don't have any
    education and partly it's why you're so ignorant about Apple products).

    The fact is that Apple is the only common consumer operating system creator
    who fully supports only a single release. Nobody else does that.

    *Just Apple*

    The fact is that the iPhone has by far more exploits than Android.

    *Ten times more*

    Those are just facts, Jolly Roger.

    Yet your IQ is so low that you can't comprehend that those are facts.

    *You call facts trolls*

    I understand you better than you understand yourself, Jolly Roger.
    Which is why I feel sorry for you - as God didn't endow you with brains.

    Since you hate these facts, you call all facts about Apple you don't like,
    to be trolls - which tells all of us more about you than you want us to
    know.

    You _hate_ Apple, Jolly Roger.
    Secretly so.

    You _hate_ that it's so easy to prove Apple lied to you Jolly Roger.
    You _hate_ every fact I say about Apple makes you hate Apple even more.

    As I said, I understand you better than you understand yourself.

    You're a herd animal, Jolly Roger.
    You bought into the herd mentality.

    You love the advertisements.
    But you hate the facts.

    That's why you call every fact about Apple you hate, a troll.
    And that... is a lot of facts that you call trolls.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)