How does Apple or FIDO know you are the person that is authorized to access that phone? Or, how does the 3rd party applications (apps) that are accessed through the phone know you are the person authorized to have access? The fingerprint sensor? Well, what if that mobile fingerprint authentication capability isn’t very accurate? What if it’s spoofable because the technology doesn’t use enough data to authenticate the user with a high degree of assurance?  Given both Apple and Samsung’s …