- cross-posted to:
- technology@lemmy.zip
- cross-posted to:
- technology@lemmy.zip
You must log in or # to comment.
This article is frustratingly light on the technical details of how thieves are bypassimg fingerprint security on stolen phones. Anyone have any sources?