New User? Click here to register! Feel free to read this for beginners help.

Computer Cops
image image image image image image image image
Prime Choice
· Dnld of the Week!
· Yahoo & CCSP!
· Find a Cure!
· Bonus Dnld!

· Ian T's (Article 11)
· Marcia's (Op6)
· Paul's (Article 3)

· Ian T's Archive
· Marcia's Archive
· Paul's Archive
· Dnload Archive!
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Security Central
· Home
· Wireless
· Bookmarks
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· Recommend Us
· RegChat
· Reviews
· Search
· Sections
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
Donations
image
Search

image
Survey
Which Anti-Virus product do you use?

Computer Associates
Eset (NOD32)
F-Secure
Frisk (F-Prot)
Grisoft (AVG)
Kaspersky
Network Associates (McAfee)
Panda
Sophos
Symantec (NAV)
Trend Micro
Other



Results
Polls

Votes: 7249
Comments: 63
image
image cybsec: Passwords: Clever people can fool most sophisticated biometrics image
Cyber Security
The idea is this: Instead of logging on to your computer using a password that you can't remember and have to write on the back of an envelope, which you leave on Metro to be found by a spy, you put your finger on a little reader attached to your computer. It reads your fingerprint, compares it with your stored print and decides that you are really you.

The iris scanner does the same thing, but with your eyes. Irises have unique patterns. Presumably anyone with your eyes is you. A third approach is face recognition. Lots of money goes into buying these technologies. They're certainly a cute idea, should they work. The manufacturers tend to say they work. Do they?

The Fraunhofer Research Institute in Darmstadt, Germany, set out to see whether it could fool these systems.

Answer: Yes. Easily.


Symantec
Posted on Monday, 17 June 2002 @ 02:00:00 EDT by paul
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· HotScripts
· W3 Consortium
· More about Cyber Security
· News by paul


Most read story about Cyber Security:
Booby Trapped software!

image
Article Rating
Average Score: 4
Votes: 1


Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

Send to a Friend  Send to a Friend
image
"Login" | Login/Create an Account | 4 comments | _SEARCHDIS
Threshold
  
The comments are owned by the poster. We aren't responsible for their content.

Re: Clever people can fool most sophisticated biometrics (Score: 1)
by Johnny-B-Goode  on Monday, 17 June 2002 @ 17:48:22 EDT
(User Info | Send a Message | _JOURNAL) http://www.hg-fegen.co.uk
Maybe DNA coding would be better......


[ Reply to This ]


Re: Clever people can fool most sophisticated biometrics (Score: 1)
by Jabba  on Tuesday, 18 June 2002 @ 14:27:25 EDT
(User Info | Send a Message) http://www.dfwforums.net
The really scary part about the easy defeat of these Biometric security measures is that it will unfortunately leave our Government to conclude that the only true secure form of ID will be those damn implanted chips!
Even security measures that use DNA can be fooled if you happen to leave some behind somewhere, whether by accident or taken by force.
Same goes for the chip implants. They will all be implanted in the same location on every human.
It Won't take much work to dig them out of someones' thigh.
And what about those implant readers? Someone could steal one and go around reading peoples implants and using the information to commit the same fraud that is being done right now when your social security number or drivers license is stolen.

Screw all this! I'm moving to Belize!


[ Reply to This ]