After reading all of this I'm still left wondering one thing. To what end? One rule of security that I've always assumed is "Physical access equals root access." No matter what security measures you use, anyone with unlimited time and resources will eventually gain access to your data. Any data on a device that leaves your home or office, especially one that is as easily taken as a phone, should pretty much be considered already stolen.
Instead of coming up with obscure ways to game Touch ID to make it just that much harder to get around, your energy would be better spent asking yourself "What data do I have on my phone that I would not want someone gaining access to?" Once you answer that question, you should delete that data from your phone. It's as simple as that.
Now, where improved security can help is for those times when someone takes your phone, accesses data, and then tries to return it to you before you notice that it's gone. In this scenario the miscreant has only limited time. Most likely a few seconds or minutes. The only method I've seen to get around Touch ID requires munch longer than this scenario allows, and thus is not a concern.
Instead of coming up with obscure ways to game Touch ID to make it just that much harder to get around, your energy would be better spent asking yourself "What data do I have on my phone that I would not want someone gaining access to?" Once you answer that question, you should delete that data from your phone. It's as simple as that.
Now, where improved security can help is for those times when someone takes your phone, accesses data, and then tries to return it to you before you notice that it's gone. In this scenario the miscreant has only limited time. Most likely a few seconds or minutes. The only method I've seen to get around Touch ID requires munch longer than this scenario allows, and thus is not a concern.