this post was submitted on 08 Jun 2025
122 points (96.9% liked)

Linux

10975 readers
257 users here now

Welcome to c/linux!

Welcome to our thriving Linux community! Whether you're a seasoned Linux enthusiast or just starting your journey, we're excited to have you here. Explore, learn, and collaborate with like-minded individuals who share a passion for open-source software and the endless possibilities it offers. Together, let's dive into the world of Linux and embrace the power of freedom, customization, and innovation. Enjoy your stay and feel free to join the vibrant discussions that await you!

Rules:

  1. Stay on topic: Posts and discussions should be related to Linux, open source software, and related technologies.

  2. Be respectful: Treat fellow community members with respect and courtesy.

  3. Quality over quantity: Share informative and thought-provoking content.

  4. No spam or self-promotion: Avoid excessive self-promotion or spamming.

  5. No NSFW adult content

  6. Follow general lemmy guidelines.

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Jumuta@sh.itjust.works 11 points 1 day ago (1 children)

it's always amazed me that fingerprint sensors aren't all match on chip, for the longest time I assumed that the fingerprint reader held a key for unlocking the device that is only returned with the correct fingerprint. How else do you implement them securely?

[–] 3abas@lemm.ee 5 points 19 hours ago

It is. It's just... how do you know you're actually talking to the fingerprint sensor and not a fake one that's been plugged in?

Think of it like a locked mailbox: the fingerprint sensor might securely match the fingerprint and only unlock if it's correct—but if anyone can swap out the mailbox with their own lookalike, and the OS just blindly accepts the "unlocked" signal, the whole security model breaks. Without an attestation mechanism (like SDCP on Windows or secure enclave-backed verification), the OS can't prove it's getting input from trusted hardware. Match-on-chip helps, but it's not enough unless the result is cryptographically signed by the sensor and validated by the OS through a trusted, authenticated channel.

That's the gap in Linux: there's no widely adopted standard for verifying that trust path end-to-end.