It should be easy to MITM victims of powned phones unless they pay extremely close care to ping times or RTT in general.
All I have to do is pown someone's phone and use an app on my phone to make my phone look like its their phone, regardless of where they actually are. I can't imagine the facial recognition would be that good.
Its a simple extension of physically stealing phones or cloning like people did in the 80s/90s on analog AMPS. cloning is interesting to think about, steal their amazon auth info, remotely brick their phone for good luck, walk in with a burner phone claiming to be their new phone, its all good.
All I have to do is pown someone's phone and use an app on my phone to make my phone look like its their phone, regardless of where they actually are. I can't imagine the facial recognition would be that good.
Its a simple extension of physically stealing phones or cloning like people did in the 80s/90s on analog AMPS. cloning is interesting to think about, steal their amazon auth info, remotely brick their phone for good luck, walk in with a burner phone claiming to be their new phone, its all good.