Biometrics technology hides secret traps

Biometrics technology hides secret traps

Release date: 2014-10-21

Biometrics are unique biometric features of individuals, including fingerprints, iris scans, DNA, facial features, sounds, and many others. In some areas, these identification methods have been integrated into consumer technology. A few years ago, some brands of laptops installed a fingerprint scanner, and the new iPad Air 2 will have a built-in Touch ID fingerprint reader that the iPhone already uses.

Apple fingerprint recognition

The Apple system stores the scanned information locally—that is, it does not upload to a primary database. Ubiquitous iOS devices use biometrics for self-identification, which may be convenient for consumers. The use of biometrics by companies and governments is probably not recognized by many people.

Earlier this week, the Associated Press reported that two large financial institutions extracted voiceprints from customer calls to help prevent fraud. The Facebook website has many experts who call it the largest facial recognition database, marking everyone's photos, and some of its researchers are still working on more advanced systems. In addition, the FBI announced last month that its "next-generation identification" system, NGI, has been "full-loaded." The system is known to include an iris scan, fingerprint and facial recognition database. The US Electronic Products Rights Foundation said that by 2015, the number of photos in the NGI facial recognition database will reach 52 million - most of which are photos of criminals.

However, as biometrics technology becomes more prevalent, experts are concerned that consumers are not fully aware of the pitfalls of using personal characteristics for identity verification.

Alvaro Bedoya, director of the Privacy and Technology Center at Georgetown University School of Law, said: "The keys used to authenticate are often the ones we have. Later it became something we know, like passwords. Start using us now. It has become our feature."

Unlike other forms of digital verification technology, biometric markers are immutable. Bedoya explained: "You can change your password, but you won't be able to change your face and fingerprints after a few twists and turns."

What's worse, Bedoya says, most biometrics are naturally open. He said: "The only people who know my password are those I told them to password, and in some cases, the device I am logged in. But I will leave my fingerprint anywhere I touch, my face is in it. Every camera in front of me is shaking, and my 'Facebook' profile is also available."

Jay Stanley, an analyst with the American Civil Liberties Union, said: "Biometrics are not secrets. They are unique features of everyone. This is perfect, but it is not the same as secrets."

Not long ago, Jeremy Grant, the head of the US cyberspace trustworthy national strategy, was interviewed by reporters, acknowledging that although the use of biometrics is becoming more and more popular, it may not be suitable for all situations as the best solution for some reasons. He said: "How to use it is very terrible."

Bedoya said that biometrics usually have two uses: verification and identification. But for whatever purpose, the equipment used is the same. He explained: "Today, companies can use your facial features or voiceprints to deal with identity fraud, and tomorrow you can use it to identify a stranger."

Source: Reference Message Network

Canned Green Peas

Green Peas Canned ,Green Peas In A Can ,Green Giant Canned Peas,Canned Green Pigeon Peas

DOCANNED , https://www.docannedfamily.com