Which of the following is a common weakness associated with using biometric authentication? Continue reading →