Shel7585 wrote:
Thank you for your reply. Curious if other companies have access to obtain unique cryptographic hash of your face, if the non obtained Apple recording could ‘unlock’ your iphone.
So given you are the target of an immensely capable and well-funded adversary with deep access into Apple, Apple staff, and its hardware, firmware, and ML models, you will probably be best served by isolating or eliminating most of your complex hardware, and by reviewing your operations and procedures with and isolating your most sensitive data.
This elevated risk and value to immensely well-funded adversaries also means you and your usual locations and your possessions are subject to what can be more economical attacks, including physical breaches of your security, implanted cameras and recording devices, and intercepted (and modified) purchases.
This physical access also inherently involved in utilizing biometric backdoor of your concern. They need the device access, and they need the biometric match in physical space.
Or they have deep access, and “just” nerfed the entire TrueDepth system, which is a “why bother?” exploit, given everything else less protected than what’s in the Secure Enclave is likely also modifiable; a complete compromise of iOS and device security. (Which to be clear is within the realm of possibilities for current hardware and iOS, but the funding involved here means your adversary is correspondingly well-protected legally, and with many other options for exploitation beyond this (hypothetical) biometrics bypass.)
Get your entire security reviewed, if a Facebook ID bypass is within your risks.