From 67b5561b768b543b7b4f8ac57fa9823aa91280e0 Mon Sep 17 00:00:00 2001 From: fria <138676274+friadev@users.noreply.github.com> Date: Tue, 31 Dec 2024 16:02:42 -0600 Subject: [PATCH] wording --- blog/posts/biometrics-explained.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/blog/posts/biometrics-explained.md b/blog/posts/biometrics-explained.md index 622309c8..772c4afb 100644 --- a/blog/posts/biometrics-explained.md +++ b/blog/posts/biometrics-explained.md @@ -112,7 +112,7 @@ All forms of biometric authentication rely on proper hardware such as a secure e ## :material-matrix: Algorithm -Because biometrics need to translate the physical properties of your body to data, they rely on an algorithm to determine if their reading matches closely enough. +Because biometric systems need to translate the physical properties of your body to data, they rely on an algorithm to determine if their reading matches closely enough. Since these algorithms rely on machine learning most of the time, the only way to verify their security is through testing. [Android](https://source.android.com/docs/security/features/biometric) has guidelines on how OEMs should implement biometrics and how they can [test](https://source.android.com/docs/security/features/biometric/measure) them for security. If you're performing your own security research, you should look here for guidance on testing methodology.