said by NotTheMama:I guess the hard part is how does a biometric device report its scan to the related security package. And could that be man in the middled. aka someone records a legit input and then fools into taking a directly fed data stream.
Well, the best security systems involve a challenge based on (1) something you have (or are) and (2) something you know. The first could be a device or something else to--supposedly--"prove" who you are (retina scan, fingerprint reader ..."ring"?). Of course, the second could still be a password (or PIN). (However, would this actually make your accounts et al "hack-proof"?)
(At least, if the first were in use here, then one might not jump to the conclusion that someone "unavailable" is a "guy"? )