“Post” remote biometric identification methods, with the only real exception of law enforcement for the prosecution of serious crimes and only immediately after judicial authorization; Data is at its most susceptible when it is actually in movement and securing data During this state requires specialised abilities and robust stability. Our exp