Active Topics

 



Notices


Reply
Thread Tools
nthn's Avatar
Posts: 625 | Thanked: 2,279 times | Joined on Jun 2014
#2681
Originally Posted by imaginaryenemy View Post
I now see that you are far more important than I, in which case maybe worrying that someone will take a mold of your finger to access your phone is warranted.
But it doesn't matter how important you are. You can be made important. Likewise, it doesn't matter how important the information on your device is, it can be made important.
 

The Following 3 Users Say Thank You to nthn For This Useful Post:
Posts: 608 | Thanked: 613 times | Joined on Mar 2012 @ Ohio
#2682
Originally Posted by nthn View Post
But it doesn't matter how important you are. You can be made important. Likewise, it doesn't matter how important the information on your device is, it can be made important.
Listen, I totally understand the argument. If someone had access to my email or text messages, they could certainly makes some waves. And sure, If someone wanted to post as me on this forum, I wouldn't be stoked about it. Point is, my accounts can be hacked in a number of ways not having anything to do with my phone.

I was simply saying that the chances of someone taking a mold of my finger to get access to what I have on my phone is the most ridiculous thing I have ever heard. For some of you, maybe it is less far fetched. Maybe you are blackmail-able. Maybe you have access to money and power. Maybe your lives are on your phone.

For me, a skimmer on a credit card reader at a gas pump, or an ebay seller taking advantage, or someone breaking into my car are far more realistic concerns. In my life, if someone got access to my phone, it would be to sell it, not post something from my Twitter account.
 

The Following 2 Users Say Thank You to imaginaryenemy For This Useful Post:
Posts: 287 | Thanked: 1,140 times | Joined on Feb 2015
#2683
Originally Posted by imaginaryenemy View Post
LMaybe you are blackmail-able. Maybe you have access to money and power. Maybe your lives are on your phone.
or maybe you work at some place, that some people might find interesting
or maybe you know some people, that some people might find interesting

PS and if and when it happens, you won't even know of it
 

The Following 4 Users Say Thank You to lantern For This Useful Post:
pichlo's Avatar
Posts: 5,351 | Thanked: 16,371 times | Joined on Sep 2012 @ UK
#2684
Just a small wake-up call, I received an email yesterday with one of my throwaway passwords in the subject. It said, "I am aware that this is your password, pay me $lots in bitcoin or I will do some nasty things". I have not used that password for a long time and do not know which website was hacked to get hold of it. It's just a good reminder to never drop guard on security.
__________________
In particle accelerators atoms are indeed not only touching each others. But banging together in a massive explosive orgasm.
-- nieldk in a TMO post
 

The Following 5 Users Say Thank You to pichlo For This Useful Post:
Posts: 608 | Thanked: 613 times | Joined on Mar 2012 @ Ohio
#2685
I feel like there are two different conversations going on at the same time. I am VERY aware of the security weaknesses of the world we live in and the dangers that follow. I do not take the possibilities lightly.

The conversation being had (by me) was, on a cell phone, is a fingerprint reader adequate security, or do we have to fear people taking molds of our fingers to gain access.
 

The Following 2 Users Say Thank You to imaginaryenemy For This Useful Post:
Posts: 32 | Thanked: 106 times | Joined on Jan 2018 @ Netherlands
#2686
Originally Posted by imaginaryenemy View Post
I feel like there are two different conversations going on at the same time. I am VERY aware of the security weaknesses of the world we live in and the dangers that follow. I do not take the possibilities lightly.

The conversation being had (by me) was, on a cell phone, is a fingerprint reader adequate security, or do we have to fear people taking molds of our fingers to gain access.
Ur nickname suits the off topic conversation,lol
 

The Following 4 Users Say Thank You to aQUICK1 For This Useful Post:
Posts: 1,255 | Thanked: 2,744 times | Joined on Jun 2011 @ Finland
#2687
I'm with imaginaryenemy on this rambling discussion.

Security on cell phones has so far always been a compromise between convenience and the strength of security.

And only you, for your own usecase, know how to balance the two.

I've seen people go through the most ridiculous hurdles to secure the most irrelevant things. Because "security".

I've seen people disregarding security for convenience even as it opens holes for quite sensitive data.

Myself, I couldn't be arsed to fiddle with that pin code everytime i unlock my phone. Because I do it hundreds of times per day. Nor with the cumbersome fingerprint scanner of current Sailfish X (I tried). The data I have on my phone is not in importance proportional to the inconvenience and time lost I'd suffer daily, hundreds of times.

For many others this is not the case. They have data that needs to be protected better.

And each one of us knows the balance for themselves best, where the line between convenience and security lies.

The truth of the matter is of course, that much more people do not have the knowledge to make an educated decision on this. But that's besides the point on this forum, as I think most of the participants here are well enough versed on the topic.
__________________
My N9/N950 projects:
 

The Following 2 Users Say Thank You to ajalkane For This Useful Post:
Reply

Tags
sailfish os, sony xperia x

Thread Tools

 
Forum Jump


All times are GMT. The time now is 22:58.