March 30, 2015


Comments

 
 
 
  • Somehow, I can picture a person sitting in a man-in-the-middle connection ... reading the users' facial or fingerprint id transmission. So how does one go about changing the face or fingerprint to a new one? As we currently do for a compromised password.
    Kam Woo
     
     
     
 
Advertisement