« If the attacker can physically access a locked phone with a fairly good quality fingerprint residual on it, the attacker can unlock this phone in just one second with no problem »