mfioretti: fingerprints*

Bookmarks on this page are managed by an admin user.

7 bookmark(s) - Sort by: Date ↓ / Title / Voting / - Bookmarks from other users for this tag

  1. After the first communication to the PMO, which set the ball rolling, he was informed that the system had rejected his enrolment since his fingerprints partially matched with not one, but seven registered citizens, all from Surpur taluk in Yadgir district.

    “I tracked them and presented them physically before the officials,” he said, to establish that there was no duplication. His number was finally generated at the Aadhaar Adalat at Yadgir recently. Of the seven with whom his fingerprints had partially matched included a child and an 86-year-old. “How could my fingerprints match with seven persons, and yet they got Aadhaar?” he asked.

    UIDAI sources say the problem began for Mr. Gurikar after he, in the past, tried to help those who came to the enrolment centres. “While helping people get their biometrics right, even his fingerprints had been partially captured in seven cases. Though Aadhaar had been generated for the seven, their numbers had been deactivated by the system automatically.” Sources said the fingerprints of the seven were recaptured and their Aadhaar numbers enabled. This helped Mr. Gurikar get Aadhaar.
    Tags: , , , by M. Fioretti (2018-01-19)
    Voting 0
  2. In Ghagaon, where a women’s cooperative runs the fair price shop, the internet has not worked even once. “We have to stand on the wall, or go near the pond, and ask everyone to come there to look for signal on the point of sale device,” said Mongra Sidar, a Gond Adivasi. “Or, we try inside the ration shop, then one person has to climb the chabootra elevated platform » , while another person stands on the ground to note down the details in the notebook.”

    In Raipur, officials said one lakh out of three lakh transactions using fingerprint authentication did not go through – a failure rate as high as 30%. They attributed the failures primarily to network connectivity problems and skin abrasions on fingers.
    Photographs as backup

    With fingerprint authentication failing for even genuine card holders who have been verified by local authorities, Chhattisgarh has come with an innovation: ration shop owners have been asked to take photographs of such people before giving them food rations.

    This photograph is stored in the government’s server. “It will serve as deterrent to ration dealers that even if there is a complaint six months later, the government can check if grains were given to the right beneficiaries,”

    “Earlier, we sent one boy on the bicycle to lift the rations for three households,” lamented Tapaswani Yadav, a middle-aged woman. “Now, it is a waste of time for everyone. Many elderly persons cannot walk, it is difficult for a few to even sit astride a motorcycle.”

    She added: “The machine is so slow, sometimes people reach the ration shop in the morning and return when the day is over.”

    Five technologies need to work together for biometric authentication to be successful – the point of sale device, internet connectivity, biometrics, the National Informatics Centre server, and the Unique Identity Authority of India servers. Invariably, one of the five fails.

    Shyamlal Dansena, the ration dealer in Dilari panchayat in Raigarh, said fingerprint authentication failed for 20% of the ration card holders on an average. But in October, he had to give grains to all 386 ration card holders after taking their photographs since the Samsung tablet purchased by the panchayat for enabling the Aadhaar-based transactions had stopped functioning.

    Dansena was preparing to travel 20 kilometers to Raigarh to get the tablet repaired. “The food officer said we can give November month’s grains only after the software is loaded again,” he said.
    Voting 0
  3. As German Interior Minister Wolfgang Schauble discovered, you leak your fingerprints all the time, and once your fingerprint has been compromised, you can't change it. (Schauble was pushing for biometric identity cards; playful Chaos Computer Club hackers lifted his fingerprints off a water-glass after a debate and published 10,000 copies of them on acetate as a magazine insert).

    This is the paradox of biometric authentication. The biometric characteristics of your retinas, fingerprints, hand geometry, gait, and DNA are actually pretty easy to come by without your knowledge or consent. Unless you never venture into public without a clean-room bunny-suit, mirrorshades, and sharp gravel in your shoes, you're not going to be able to stop dedicate strangers from capturing these measurements. And as with Schauble's fingerprints, you can't revoke your DNA and replace it with new DNA once a ripoff artist has used it to clean out your bank-account or break into your workplace.

    That's why cops use them, after all: it's nearly impossible to keep them to yourself, and once they're in the wild, they can be used against you.
    Tags: , by M. Fioretti (2014-09-12)
    Voting 0
  4. Researchers at Belgium’s University of Leuven have revealed the widespread use of a technique called “canvas fingerprinting” that tracks the activities of people on a website without their knowledge.

    More than 5,600 websites were identified using the fingerprinting technique including Australian websites such as Australia Post, the Fairwork Ombudsman and the Sea Shepherd conservation group.

    While this technique is relatively new, it represents another front in a very long battle to find out what users do online, and raises concerns about our ability to control our online privacy.
    Voting 0
  5. The researchers found canvas fingerprinting computer code, primarily written by a company called AddThis, on 5% of the top 100,000 websites. Most of the code was on websites that use AddThis’ social media sharing tools. Other fingerprinters include the German digital marketer Ligatus and the Canadian dating site Plentyoffish. (A list of all the websites on which researchers found the code is here).

    Rich Harris, chief executive of AddThis, said that the company began testing canvas fingerprinting earlier this year as a possible way to replace “cookies,” the traditional way that users are tracked, via text files installed on their computers.

    “We’re looking for a cookie alternative,” Harris said in an interview.

    Harris said the company considered the privacy implications of canvas fingerprinting before launching the test, but decided “this is well within the rules and regulations and laws and policies that we have.”
    Voting 0
  6. Apple's fingerprint sensor on the iPhone 5S doesn't always work the way it should
    Some iPhones don't approve fingerprints they're supposed to approve
    Sensor is susceptible to problems caused by dust, moisture, and electrostatic discharge,
    User error could also be causing some people's issues with the Touch ID system
    Tags: , , , by M. Fioretti (2013-12-04)
    Voting 0
  7. let's just say you're okay with Apple sharing your fingerprints with the NSA, as I've already told you, they're not private at all. You leave them on everything you touch. And let's say you're insistent on using fingerprint (biometric) technology because you can. In that case, your fingerprints might identify you, much as a your email address or username identifies you, perhaps from a list.

    But it cannot, and absolutely must not, but used to authenticate that identity.

    There are plenty of inventions that exists, but turned out to be bad ideas. And I think fingerprint readers are another one of those.

    So please, if you have any respect for the privacy your data, or your contacts' information, please don't use fingerprints (or biometrics, in general) for authentication.
    Tags: , by M. Fioretti (2013-10-01)
    Voting 0

Top of the page

First / Previous / Next / Last / Page 1 of 1 Online Bookmarks of M. Fioretti: Tags: fingerprints

About - Propulsed by SemanticScuttle