{"id":6763,"date":"2010-10-12T05:59:38","date_gmt":"2010-10-12T10:59:38","guid":{"rendered":"http:\/\/blogs.scienceforums.net\/swansont\/?p=6763"},"modified":"2010-10-12T05:59:38","modified_gmt":"2010-10-12T10:59:38","slug":"bio-dubious","status":"publish","type":"post","link":"http:\/\/blogs.scienceforums.net\/swansont\/archives\/6763","title":{"rendered":"Bio-Dubious"},"content":{"rendered":"<p><a href=\"http:\/\/www.economist.com\/blogs\/babbage\/2010\/10\/biometrics\">The Difference Engine: Dubious security<\/a><\/p>\n<blockquote><p>Authentication of a person is usually based on one of three things: something the person knows, such as a password; something physical the person possesses, like an actual key or token; or something about the person\u2019s appearance or behaviour. Biometric authentication relies on the third approach. Its advantage is that, unlike a password or a token, it can work without active input from the user. That makes it both convenient and efficient: there is nothing to carry, forget or lose.<\/p>\n<p>The downside is that biometric screening can also work without the user\u2019s co-operation or even knowledge. Covert identification may be a boon when screening for terrorists or criminals, but it raises serious concerns for innocent individuals. Biometric identification can even invite violence. A motorist in Germany had a finger chopped off by thieves seeking to steal his exotic car, which used a fingerprint reader instead of a conventional door lock. <\/p><\/blockquote>\n<p>Plus, you can also fake out scanners with <a href=\"http:\/\/www.newswise.com\/articles\/view\/516717\/\">digits made from play-doh or gelatin<\/a> (after which, especially for the latter, you could eat the evidence).  Still waiting for that one to show up on CSI.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Difference Engine: Dubious security Authentication of a person is usually based on one of three things: something the person knows, such as a password; something physical the person possesses, like an actual key or token; or something about the &hellip; <a href=\"http:\/\/blogs.scienceforums.net\/swansont\/archives\/6763\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[48,53],"tags":[],"class_list":["post-6763","post","type-post","status-publish","format-standard","hentry","category-security","category-tech"],"_links":{"self":[{"href":"http:\/\/blogs.scienceforums.net\/swansont\/wp-json\/wp\/v2\/posts\/6763","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/blogs.scienceforums.net\/swansont\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/blogs.scienceforums.net\/swansont\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/blogs.scienceforums.net\/swansont\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/blogs.scienceforums.net\/swansont\/wp-json\/wp\/v2\/comments?post=6763"}],"version-history":[{"count":0,"href":"http:\/\/blogs.scienceforums.net\/swansont\/wp-json\/wp\/v2\/posts\/6763\/revisions"}],"wp:attachment":[{"href":"http:\/\/blogs.scienceforums.net\/swansont\/wp-json\/wp\/v2\/media?parent=6763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/blogs.scienceforums.net\/swansont\/wp-json\/wp\/v2\/categories?post=6763"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/blogs.scienceforums.net\/swansont\/wp-json\/wp\/v2\/tags?post=6763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}