Fingerprint cloning: Myth or reality?
What are the security improvements in fingerprint scanning since it was first defeated on the iPhone 5? How does 3-D printing technology impact fingerprint authentication?
Define a threat model to the attacks to provide a realistic context.
Source: talosintelligence.com