Paul on 3 Dec 2004 14:59:03 -0000 |
George Gallen wrote: no, actually, in this sense, I meant bypassed. I assume that the gadget transforms figerprints to a number, and how unique would that number be vs using a password system. This is what I meant by possible protocol weakness. Maybe something like a keystroke capture device, or software, could be used to capture and replay the output of the thumbprint scanner. ___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug
|
|