Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://chaosfem.tw/@leeloo" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>leeloo</span></a></span> <span class="h-card" translate="no"><a href="https://mas.to/@Cykelero" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Cykelero</span></a></span> also <a href="https://infosec.space/tags/FaceID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FaceID</span></a> can, has and will be used by force against the user.</p><ul><li>IOW: What prevents an Attacker from grabbing a victim at their beck and holding the phone up to theor face? </li></ul><p>At least with <a href="https://infosec.space/tags/Passwords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Passwords</span></a> & <a href="https://infosec.space/tags/PIN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PIN</span></a>|s there are some systems that have the option of a <em>"Duress Code"</em> in which they'll wipe the device and it's keys.</p><ul><li>Allegedly <span class="h-card" translate="no"><a href="https://grapheneos.social/@GrapheneOS" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>GrapheneOS</span></a></span> has that feature...</li></ul>