• Flatfire@lemmy.ca
    link
    fedilink
    English
    arrow-up
    26
    arrow-down
    3
    ·
    edit-2
    1 day ago

    Fingerprint sensors have been an interesting hurdle for Linux distros. Not one I necessarily would have anticipated either. The biggest question seems to come down to their security as well, given that there have been exposed flaws in the design of biometric hardware that tries to generalize its compatibility.

    Microsoft has defined SDCP as a strong standard for TPM/Windows, but there isn’t an equivalent for Linux. Match on chip sensors have made things a bit easier, but there isn’t a standard way to communicate the validated authentication to the OS, usually relying on TLS.

    • Jumuta@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      13
      ·
      1 day ago

      it’s always amazed me that fingerprint sensors aren’t all match on chip, for the longest time I assumed that the fingerprint reader held a key for unlocking the device that is only returned with the correct fingerprint. How else do you implement them securely?

      • 3abas@lemm.ee
        link
        fedilink
        English
        arrow-up
        5
        ·
        1 day ago

        It is. It’s just… how do you know you’re actually talking to the fingerprint sensor and not a fake one that’s been plugged in?

        Think of it like a locked mailbox: the fingerprint sensor might securely match the fingerprint and only unlock if it’s correct—but if anyone can swap out the mailbox with their own lookalike, and the OS just blindly accepts the “unlocked” signal, the whole security model breaks. Without an attestation mechanism (like SDCP on Windows or secure enclave-backed verification), the OS can’t prove it’s getting input from trusted hardware. Match-on-chip helps, but it’s not enough unless the result is cryptographically signed by the sensor and validated by the OS through a trusted, authenticated channel.

        That’s the gap in Linux: there’s no widely adopted standard for verifying that trust path end-to-end.