That's one example, but in today's world with cars having much more in them with automated braking and lane departure avoidance and all that kind of stuff seems like there's quite a bit to keep being secure and away from hacking (didn't GM just have a recall in relation to some of their vehicles being susceptible to hacking to the point of someone taking over the vehicle in various ways?).
It does not matter what component is replaced in a car, car manufacturers do not play big brother, they can inform/warn you of the risks of the modification and consequences on the warranty, they have no ability or arrogance to disable your car (unless stolen ).
In the GM example the recall was justified as an issue was found in a GM installed component, GM will not recall and take action for 3rd party components installed in your car forcing you to install thier parts, and that is what apple is doing.
At least with the GM example, it was proven to be a viable and technically possible threat, with the touchid, apple is yet to prove that thier security and your data is technically accessible with a 3rd party part. This is the problem, cause at this point there is no evidence! The touchid is a dumb sensor, converts a finger print into data , love apple to explain how the 3rd party touchid magically uses incorrect data to tell the iPhone it's correct to gain access.... If that is possible, Apple has a huge issue with security.
From all my research into touchid and apples presentations when it launched it, along with tear downs , there is no way to circumnavigate the Touch ID to access your data . It's technically not possible . So I have a laugh when appLe pulls this stunt.
If there was be very very sacred, cause that is exactly the backdoor governments and others are looking for.
[doublepost=1455093589][/doublepost]
Picture this scenario:
You visit Paraguay on a nice vacation and drop your iPhone causing the phone to break. You then feel that you need your phone; as you are on vacation, so you get it repaired. $50 US and you are good to go... Until you get home and come to realize that your touch ID had been stolen along with your CC info, back account number, social security #, etc. and to top that all off you have been subjected to key logging and camera MTM attacks making every photo you took and every keystroke you typed a piece of information the ID thieves (aka the 3rd party repairman) have and are using to enhance their wealth and ruin your life. That is the scenario you risk when you allow non-validated part swaps in a device like an iPhone (or a full fledged computer for that matter). As for those of you that say "gee, just deactivate touch ID" I say think about how much sense it makes to detect a breach you KNOW about and deciding to leave the device vulnerable to attacks you DO NOT or MAY NOT know about rather than shut it down.
Is your identity and the contents of your phone worth less than $329 for a swap at an Apple Store? Actually, is it worth less than full price of an iPhone? If it is you probably should not own an iPhone or any other smart phone for that matter.
The scenario is irrelevant as there is no proof it's possible.
A Touch ID is a dumb scanner , that is all it is. All it does is scan you finger, that fingerprint is then converted into a mathematical formula, encrypted, and carried over a hardware channel to a secure enclave on the Apple A7 chipset. If the fingerprint is recognized, a "yes" token is released. If it's not, a "no" token is released.
If Apple releases evidence a 3rd party scanner is cable of magically passing incorrect data to the A7 chip and getting a yes token .... Forget the touchid all together, some genius had found a way to circumnavigate encryption
As soon as you replace your touchid, it does not work , it is not even able to send the data to the A7, as there is a hardware mismatch, let along somehow magically sending incorrect data and getting a yes token.
People have already decided that this is happening......
FYI, it's easier for hackers to get all your data from cloud services, Facebook, your computer etc etc, this scenario is actually the least realistic.