Why biometric security fails at being secure

Watch on YouTube

Show annotations

Download is disabled.

67,696

5,911

116

Genre: Science & Technology

Family friendly? Yes

Wilson score: 0.977

Rating: 4.923 / 5

Engagement: 8.9%

The Hated One

Subscribe | 229K

Shared February 18, 2020

Biometric security is strong and unique. But what happens if somebody steals your faceprint or fingerprint? You are compromised everywhere for the rest of your life.

Support me through Patreon: https://www.patreon.com/thehatedone

- or donate anonymously:

Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfVMQ9zjAULL6rd11ASRGpxD1w6jQrMtqAGkkqiid5ef7QDroTPp

Bitcoin: 1HkDxXAVDFhBHSyRjam5WW5uoY88sxn5qz

The whole promise of biometric security stands and falls on how easy it is to replicate and abuse biometric modals. And the short answer is – it’s a cat and mouse game. On the long enough timeline, someone will be able to recreate a copy of your face or fingerprints that works just fine enough to fool authenticating systems. Once your biometric data is compromised, it affects all applications at once and you will be affected for the rest of your life.

Sources (in chronological order):

Entropy https://security.stackexchange.com/qu...
Biometric data compromise https://securelist.com/biometric-data...
CCC group tricking Apple Touch ID https://www.ccc.de/en/updates/2013/cc... → video https://vimeo.com/75324765
German minister fingerprint https://www.theguardian.com/technolog...
Kaspersky report https://threatpost.com/threatlist-a-t...
Taylor Swift using facial recognition https://www.nbcnews.com/tech/tech-new...
Vimeo law suit over facial recognition https://threatpost.com/vimeo-slapped-...
Researchers bypass Apple Face ID https://threatpost.com/researchers-by...
Another bypass of Face ID https://www.usenix.org/conference/use...
Android face unlock features suck https://9to5mac.com/2018/03/23/face-i...
U.S. Office of Personnel Management data breach https://www.opm.gov/cybersecurity/cyb...
1 million fingerprints lost in a UK data base https://www.theguardian.com/technolog...
Airline data breaches https://www.cpomagazine.com/cyber-sec...
False rejection and false acceptance https://biometrictoday.com/10-advanta...
and this: https://protonmail.com/blog/biometric...
Passwords are better https://securelist.com/biometric-data...
Government can abuse Face ID, Touch ID
https://www.theguardian.com/commentis...




Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcav...


Follow me:
https://twitter.com/The_HatedOne_
https://www.bitchute.com/TheHatedOne/
https://www.reddit.com/r/thehatedone/
https://www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.



24:19

Cyber security and breaking biometrics - BBC Click

45K views

12:32

Tor vs VPN | Which one should you use for privacy, anonymity and security

236K views

13:17

Ultimate smartphone security guide | How to secure your phone tutorial

250K views

28:35

How the US Government took control of the Internet | The Hacker Crackdown

105K views

1:00:04

Bitcoin Documentary | Crypto Currencies | Bitcoins | Blockchain | Digital Currency | Money | Gold

249K views

16:29

10 Reasons to Ignore AI Safety

113K views

1:34:03

Network Security 101: Full Workshop

782K views

9:24

How NOT to Store Passwords! - Computerphile

1.9M views

10:54

The problem with the recentralization of Bitcoin explained

43K views

16:00

Linux File System/Structure Explained!

1.6M views

9:36

This is how Google is spying on everything you do

335K views

22:02

iPhones remotely compromised: iOS security is more broken than you think

103K views

25:54

How to Make Your Own VPN (And Why You Would Want to)

165K views

13:18

How to secure your network | Tutorial | Wi-Fi security guide

103K views

13:49

How to secure your online accounts

89K views

1:03:43

How To Speak by Patrick Winston

1.2M views

16:53

Demonetized by the US government | Permanent Record by Edward Snowden

39K views

23:59

How to be anonymous on the web? Tor, Dark net, Whonix, Tails, Linux

1.1M views

9:25

How China exports censorship into corporate America

33K views