But that’s not the point. If a machine is compromised, the data representing your face is now copied, invalidating the uniqueness of your face. Your face can no longer be used as a key to unlock a machine. Any criminal with a copy of that face data can use it to unlock other machines unless that data is removed. So,…