On Tue, 12 Oct 2004, John Kelsey wrote: > but there doesn't seem to be a clean process for determining how > skilled an attacker needs to be to, say, scan my finger once, and > produce either a fake finger or a machine for projecting a fake > fingerprint into the reader.
.. or a replacement reader that fakes the signals to the rest of the security system. --apb (Alan Barrett)