Shared February 18, 2020
Biometric security is strong and unique. But what happens if somebody steals your faceprint or fingerprint? You are compromised everywhere for the rest of your life.
Support me through Patreon: https://www.patreon.com/thehatedone
- or donate anonymously:
The whole promise of biometric security stands and falls on how easy it is to replicate and abuse biometric modals. And the short answer is – it’s a cat and mouse game. On the long enough timeline, someone will be able to recreate a copy of your face or fingerprints that works just fine enough to fool authenticating systems. Once your biometric data is compromised, it affects all applications at once and you will be affected for the rest of your life.
Sources (in chronological order):
Biometric data compromise https://securelist.com/biometric-data...
CCC group tricking Apple Touch ID https://www.ccc.de/en/updates/2013/cc... → video https://vimeo.com/75324765
German minister fingerprint https://www.theguardian.com/technolog...
Kaspersky report https://threatpost.com/threatlist-a-t...
Taylor Swift using facial recognition https://www.nbcnews.com/tech/tech-new...
Vimeo law suit over facial recognition https://threatpost.com/vimeo-slapped-...
Researchers bypass Apple Face ID https://threatpost.com/researchers-by...
Another bypass of Face ID https://www.usenix.org/conference/use...
Android face unlock features suck https://9to5mac.com/2018/03/23/face-i...
U.S. Office of Personnel Management data breach https://www.opm.gov/cybersecurity/cyb...
1 million fingerprints lost in a UK data base https://www.theguardian.com/technolog...
Airline data breaches https://www.cpomagazine.com/cyber-sec...
False rejection and false acceptance https://biometrictoday.com/10-advanta...
and this: https://protonmail.com/blog/biometric...
Passwords are better https://securelist.com/biometric-data...
Government can abuse Face ID, Touch ID
Credits: Music by CO.AG Music https://www.youtube.com/channel/UCcav...
The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
Cyber security and breaking biometrics - BBC Click
Tor vs VPN | Which one should you use for privacy, anonymity and security
Ultimate smartphone security guide | How to secure your phone tutorial
How the US Government took control of the Internet | The Hacker Crackdown
Bitcoin Documentary | Crypto Currencies | Bitcoins | Blockchain | Digital Currency | Money | Gold
10 Reasons to Ignore AI Safety
Network Security 101: Full Workshop
How NOT to Store Passwords! - Computerphile
The problem with the recentralization of Bitcoin explained
Linux File System/Structure Explained!
This is how Google is spying on everything you do
iPhones remotely compromised: iOS security is more broken than you think
How to Make Your Own VPN (And Why You Would Want to)
How to secure your network | Tutorial | Wi-Fi security guide
How to secure your online accounts
How To Speak by Patrick Winston
Demonetized by the US government | Permanent Record by Edward Snowden
How to be anonymous on the web? Tor, Dark net, Whonix, Tails, Linux
How China exports censorship into corporate America