SlideShare a Scribd company logo
1 of 2
- Misuse in Cyberspace of Biometrics Discussed on Media -
Elsevier's "Biometric Technology Today" has published an article of mine titled
"Biometrics: great technology for physical security, probably big mistake for cyber
security?" in the May/2016 issue as announced at
http://www.sciencedirect.com/science/article/pii/S0969476516300881
The conclusion of the article is “In summary, based on this analysis, in most cases
authentication by biometrics provides poorer security than pincode or password-only
authentication. And given that a false sense of security is often worse than the lack of
security, I would like to put forward these suggestions: the vendors of smart devices
who are conscious of the privacy and security of consumers could tell consumers not to
turn on the biometric functions; consumers who are concerned about their privacy and
security could refrain from activating the biometric backdoors; and the deployment of
biometric solutions could instead be recommended where consumers can accept ‘below-
one’ factor authentication in return for better convenience.”
-------------------------------------------------------
Similar articles of the same tenor have been published or taken up by
- Payments Journal: Misuse of Biometrics Technology
http://www.paymentsjournal.com/Content/Blogs/Industry_Blog/30986/
- Information Security Buzz: Misuse of Biometrics – Blind Spot in Our Mind and
False Sense of Security
http://www.informationsecuritybuzz.com/articles/misuse-biometrics-blind-spot-mind-
false-sense-security/
- SC Magazine UK (1): False sense of security spreading on a gigantic scale
http://www.scmagazineuk.com/false-sense-of-security-spreading-on-a-gigantic-
scale/article/478372/#disqus_thread
- SC Magazine UK (2): Biometrics deployed with a fallback password: statistics on false
sense of security
http://www.scmagazineuk.com/biometrics-deployed-with-a-fallback-password-statistics-
on-false-sense-of-security/article/485434/
- Forbes: Even Poor Biometrics Are Better than No Security At All
http://www.forbes.com/sites/tonybradley/2016/03/21/even-poor-biometrics-are-better-
than-no-security-at-all/#1e8840404bc2
- ProgrammableWeb : FBI Apple Debacle Is a Reminder of How Fingerprint Sensors
Actually Worsen Security
http://www.programmableweb.com/news/fbi-apple-debacle-reminder-how-fingerprint-
sensors-actually-worsen-security/analysis/2016/04/04
- ValueWalk (1): iPhone Encryption – Bio-metrics More Vulnerable To Backdoor Than
Password
http://www.valuewalk.com/2016/03/iphone-encryption-biometric-backdoor/
- ValueWalk (2): How To Hack The Security Of Smartphones
http://www.valuewalk.com/2016/03/how-to-hack-the-security-of-smartphones/?all=1
- CloudTweaks: WHAT TECHNOLOGY CAN DISPLACE THE PASSWORD?
http://cloudtweaks.com/2016/03/technology-displace-password/#wpautbox_latest-post
- HackRead(1): FBI identifies WhatsApp as next target while court case with Apple
goes on
https://www.hackread.com/fbi-identifies-whatsapp-as-next-target/
- HackRead (2): Backdoor on Your Smartphone Already Exists — Explained
https://www.hackread.com/backdoor-on-smartphones-already-exists/
- Top Tech News: Peril of Backdoor on Smartphones -- Blind Spot in Our Mind &
False Sense of Security
http://www.toptechnews.com/article/index.php?story_id=1300029WZHNC
- CIO Today: Peril of Backdoor on Smartphones: Blind Spots in Our Mind
http://www.cio-today.com/article/index.php?story_id=0110006XJ2BO
- Point of Sales: How Biometrics Can Weaken Security On A Device
http://pointofsale.com/2016040510437/Point-of-Sale-News/How-Biometrics-Can-
Weaken-Security-On-A-Device.html
26th May, 2016/
Hitoshi Kokumai

More Related Content

Viewers also liked

Help unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHelp unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHitoshi Kokumai
 
biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
黏性传播(高级定制版)
黏性传播(高级定制版)黏性传播(高级定制版)
黏性传播(高级定制版)lisimo
 
How to Conduct a Brand Audit 080715
How to Conduct a Brand Audit   080715How to Conduct a Brand Audit   080715
How to Conduct a Brand Audit 080715Judy Hopelain
 
スタディツアー事業化計画~新しい福利厚生の形~
スタディツアー事業化計画~新しい福利厚生の形~
スタディツアー事業化計画~新しい福利厚生の形~
スタディツアー事業化計画~新しい福利厚生の形~ stucon
 
Estado de minas 20 de julho de 2011 - capa chico lobo
Estado de minas   20 de julho de 2011 - capa chico loboEstado de minas   20 de julho de 2011 - capa chico lobo
Estado de minas 20 de julho de 2011 - capa chico loboRede Catitu
 
Elementos arquitectonicos en una obra
Elementos arquitectonicos en una obraElementos arquitectonicos en una obra
Elementos arquitectonicos en una obragene_29
 
International Volunteerism
International VolunteerismInternational Volunteerism
International VolunteerismAmanda Starbuck
 
Nuevas tecnologías de la información 8
Nuevas tecnologías de la información 8Nuevas tecnologías de la información 8
Nuevas tecnologías de la información 8Ivan Villamizar
 

Viewers also liked (11)

Blind authentication
Blind authenticationBlind authentication
Blind authentication
 
Help unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHelp unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guideline
 
biometric technology
biometric technologybiometric technology
biometric technology
 
黏性传播(高级定制版)
黏性传播(高级定制版)黏性传播(高级定制版)
黏性传播(高级定制版)
 
How to Conduct a Brand Audit 080715
How to Conduct a Brand Audit   080715How to Conduct a Brand Audit   080715
How to Conduct a Brand Audit 080715
 
Colaboración recíproca
Colaboración recíprocaColaboración recíproca
Colaboración recíproca
 
スタディツアー事業化計画~新しい福利厚生の形~
スタディツアー事業化計画~新しい福利厚生の形~
スタディツアー事業化計画~新しい福利厚生の形~
スタディツアー事業化計画~新しい福利厚生の形~
 
Estado de minas 20 de julho de 2011 - capa chico lobo
Estado de minas   20 de julho de 2011 - capa chico loboEstado de minas   20 de julho de 2011 - capa chico lobo
Estado de minas 20 de julho de 2011 - capa chico lobo
 
Elementos arquitectonicos en una obra
Elementos arquitectonicos en una obraElementos arquitectonicos en una obra
Elementos arquitectonicos en una obra
 
International Volunteerism
International VolunteerismInternational Volunteerism
International Volunteerism
 
Nuevas tecnologías de la información 8
Nuevas tecnologías de la información 8Nuevas tecnologías de la información 8
Nuevas tecnologías de la información 8
 

More from Hitoshi Kokumai

Image-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptxImage-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptxHitoshi Kokumai
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)Hitoshi Kokumai
 
Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)Hitoshi Kokumai
 
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Hitoshi Kokumai
 
Fend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic MemoryFend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic MemoryHitoshi Kokumai
 
Bring healthy second life to legacy password system
Bring healthy second life to legacy password systemBring healthy second life to legacy password system
Bring healthy second life to legacy password systemHitoshi Kokumai
 
Intriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to OneIntriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to OneHitoshi Kokumai
 
Cyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password SystemsCyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password SystemsHitoshi Kokumai
 
Updated: Presentation with Scripts at CIW2018
Updated:  Presentation with Scripts at CIW2018Updated:  Presentation with Scripts at CIW2018
Updated: Presentation with Scripts at CIW2018Hitoshi Kokumai
 
Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Hitoshi Kokumai
 
Updated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryUpdated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryHitoshi Kokumai
 
Deployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BDeployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BHitoshi Kokumai
 
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...Hitoshi Kokumai
 
Business Dimension of Expanded Password System
Business Dimension of Expanded Password SystemBusiness Dimension of Expanded Password System
Business Dimension of Expanded Password SystemHitoshi Kokumai
 
Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceHitoshi Kokumai
 

More from Hitoshi Kokumai (15)

Image-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptxImage-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptx
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)
 
Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)
 
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
 
Fend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic MemoryFend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic Memory
 
Bring healthy second life to legacy password system
Bring healthy second life to legacy password systemBring healthy second life to legacy password system
Bring healthy second life to legacy password system
 
Intriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to OneIntriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to One
 
Cyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password SystemsCyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password Systems
 
Updated: Presentation with Scripts at CIW2018
Updated:  Presentation with Scripts at CIW2018Updated:  Presentation with Scripts at CIW2018
Updated: Presentation with Scripts at CIW2018
 
Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018
 
Updated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryUpdated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and Memory
 
Deployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BDeployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63B
 
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
 
Business Dimension of Expanded Password System
Business Dimension of Expanded Password SystemBusiness Dimension of Expanded Password System
Business Dimension of Expanded Password System
 
Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity Assurance
 

Recently uploaded

Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseribangash
 

Recently uploaded (20)

Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 

Misuse in Cyberspace of Biometrics Discussed on Media

  • 1. - Misuse in Cyberspace of Biometrics Discussed on Media - Elsevier's "Biometric Technology Today" has published an article of mine titled "Biometrics: great technology for physical security, probably big mistake for cyber security?" in the May/2016 issue as announced at http://www.sciencedirect.com/science/article/pii/S0969476516300881 The conclusion of the article is “In summary, based on this analysis, in most cases authentication by biometrics provides poorer security than pincode or password-only authentication. And given that a false sense of security is often worse than the lack of security, I would like to put forward these suggestions: the vendors of smart devices who are conscious of the privacy and security of consumers could tell consumers not to turn on the biometric functions; consumers who are concerned about their privacy and security could refrain from activating the biometric backdoors; and the deployment of biometric solutions could instead be recommended where consumers can accept ‘below- one’ factor authentication in return for better convenience.” ------------------------------------------------------- Similar articles of the same tenor have been published or taken up by - Payments Journal: Misuse of Biometrics Technology http://www.paymentsjournal.com/Content/Blogs/Industry_Blog/30986/ - Information Security Buzz: Misuse of Biometrics – Blind Spot in Our Mind and False Sense of Security http://www.informationsecuritybuzz.com/articles/misuse-biometrics-blind-spot-mind- false-sense-security/ - SC Magazine UK (1): False sense of security spreading on a gigantic scale http://www.scmagazineuk.com/false-sense-of-security-spreading-on-a-gigantic- scale/article/478372/#disqus_thread - SC Magazine UK (2): Biometrics deployed with a fallback password: statistics on false sense of security http://www.scmagazineuk.com/biometrics-deployed-with-a-fallback-password-statistics- on-false-sense-of-security/article/485434/ - Forbes: Even Poor Biometrics Are Better than No Security At All http://www.forbes.com/sites/tonybradley/2016/03/21/even-poor-biometrics-are-better- than-no-security-at-all/#1e8840404bc2 - ProgrammableWeb : FBI Apple Debacle Is a Reminder of How Fingerprint Sensors Actually Worsen Security http://www.programmableweb.com/news/fbi-apple-debacle-reminder-how-fingerprint- sensors-actually-worsen-security/analysis/2016/04/04
  • 2. - ValueWalk (1): iPhone Encryption – Bio-metrics More Vulnerable To Backdoor Than Password http://www.valuewalk.com/2016/03/iphone-encryption-biometric-backdoor/ - ValueWalk (2): How To Hack The Security Of Smartphones http://www.valuewalk.com/2016/03/how-to-hack-the-security-of-smartphones/?all=1 - CloudTweaks: WHAT TECHNOLOGY CAN DISPLACE THE PASSWORD? http://cloudtweaks.com/2016/03/technology-displace-password/#wpautbox_latest-post - HackRead(1): FBI identifies WhatsApp as next target while court case with Apple goes on https://www.hackread.com/fbi-identifies-whatsapp-as-next-target/ - HackRead (2): Backdoor on Your Smartphone Already Exists — Explained https://www.hackread.com/backdoor-on-smartphones-already-exists/ - Top Tech News: Peril of Backdoor on Smartphones -- Blind Spot in Our Mind & False Sense of Security http://www.toptechnews.com/article/index.php?story_id=1300029WZHNC - CIO Today: Peril of Backdoor on Smartphones: Blind Spots in Our Mind http://www.cio-today.com/article/index.php?story_id=0110006XJ2BO - Point of Sales: How Biometrics Can Weaken Security On A Device http://pointofsale.com/2016040510437/Point-of-Sale-News/How-Biometrics-Can- Weaken-Security-On-A-Device.html 26th May, 2016/ Hitoshi Kokumai