mfioretti: biometrics* + security*

Bookmarks on this page are managed by an admin user.

6 bookmark(s) - Sort by: Date ↓ / Title / Voting / - Bookmarks from other users for this tag

  1. Unlike the Passport Officer, the RTO, the Electoral Officer, the CEO of UIDAI does not take any legal liability to certify the number as a proof of anyone’s identity, address or existence. Furthermore no one has verified or audited the database to establish how many of the billion numbers that are linked to data submitted by the outsourced parties are real individuals.

    The resulting Aadhaar database is the database being used to “purify”, as described by Ajay Bhushan Pandey the CEO of UIDAI, all databases that are seeded with Aadhaar. The seeding of other databases with the Aadhaar number is also unlike any other identification document. This seeding threatens to exclude the genuine and include the fake into other existing databases by seeding Aadhaar to other databases. The case of over 13,000 fake employees in Satyam’s who got salaries every month for years before being exposed is still fresh in India.

    As the government embarks to link the entire Consolidated Fund of India’s receipts and expenditure to this database, is it not reasonable to establish some CAG certificate on the existence of every person in this database?

    Mr. Nilekani has often highlighted the use of biometric to authenticate who you are as the core strength of the Aadhaar database. What he fails to state is that even if biometric could uniquely establish your identity uniquely throughout your life, which it cannot, its use for authentication is absurd.

    Once stolen, your biometric can be used, in a multiple of ways differing in simplicity and ease, by the thief, to perpetuate crimes that will be attributed to you and may be difficult, if not impossible, for you to deny.

    It is precisely this difference between the enrolment and use models of the Aadhaar in comparison with any other ID are a threat to you as well as the nation.
    https://tech.economictimes.indiatimes...ts/how-does-aadhaar-threaten-you/2277
    Voting 0
  2. Has Nilekani or Congress party ever informed that its biometric Aadhaar is going to be used for surveillance and security? Also is this the reason why very few MPs, MLAs and ministers from Congress have subjected themselves to biometric profiling of Aadhaar or NPR?
    http://www.moneylife.in/article/aadha...c-profiling-ndashpart-xxxi/36850.html
    Voting 0
  3. The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID. This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

    Apple had released the new iPhone with a fingerprint sensor that was supposedly much more secure than previous fingerprint technology. A lot of bogus speculation about the marvels of the new technology and how hard to defeat it supposedly is had dominated the international technology press for days.


    "In reality, Apple's sensor has just a higher resolution compared to the sensors so far. So we only needed to ramp up the resolution of our fake", said the hacker with the nickname Starbug, who performed the critical experiments that led to the successful circumvention of the fingerprint locking. "As we have said now for more than years, fingerprints should not be used to secure anything. You leave them everywhere, and it is far too easy to make fake fingers out of lifted prints." 1 »
    http://www.ccc.de/en/updates/2013/ccc-breaks-apple-touchid
    Voting 0
  4. -
    http://www.forbes.com/sites/andygreen...&utm_source=twitter&utm_medium=social
    Tags: , , , by M. Fioretti (2013-09-23)
    Voting 0
  5. a person's gait and ears are as unique as their fingerprints, adding that they are harder to fake than more traditional forms of identification.

    He has built a biometric tunnel in his lab at the University of Southampton. It contains 12 cameras which measure a person's gait as they walk along it and take pictures of their ears.

    The tunnel is brightly coloured to optimise the contrast between the subject's clothing and background, making it easier for the researchers to capture a 3D image as they walk.

    "It's normal television technology - chroma key," he said referring to the green-screen backgrounds used to superimpose people against separately filmed scenes.

    "Nobody would be seen dead in a bright green suit, or a bright blue suit, or a bright red suit.

    "We haven't tested it on 60 million people yet but the results are very encouraging."

    No two people have yet been found to have the same results, and so far far nobody has been able to replicate somebody else's gait to the extent that it fooled the computer, Professor Nixon said.
    http://www.bbc.co.uk/news/technology-20433998
    Voting 0
  6. Security researchers have discovered a way to replicate a person's eye to bypass iris-scanning security systems.
    http://www.bbc.com/news/technology-18997580#TWEET178563
    Tags: , , by M. Fioretti (2012-07-27)
    Voting 0

Top of the page

First / Previous / Next / Last / Page 1 of 1 Online Bookmarks of M. Fioretti: Tags: biometrics + security

About - Propulsed by SemanticScuttle