You’ve probably heard of two factor authentication, commonly referred to as two factor auth, or simply 2FA. It literally means using two different things to authenticate. Authentication is proving that you are who you claim to be, and providing two distinct forms of credentials is highly recommended. Not all 2FA varieties are equal however, so […]
Short or overly simple passwords are insecure. If you are using a short, memorized password then you need to change it often; if you are using a password manager use a long, complex password and you don’t need to change it as often. For short passwords do not use the first character as your required […]
How often should you change your password? Should you use a password manager? Should you store passwords in your browser? There are many common questions about passwords and password managers, so let’s take a look at a few of them. How to choose a password manager? Do you really need one? 22% of 12,500 people […]
Passwords have been the preferred method of authenticating users since the earliest days of the Internet, and they continue to be used to this day to authenticate users. The security issues are well known, but few people consider the privacy pitfalls. Our most private digital data are protected by passwords, yet people are generally lacking […]
China is pioneering efforts to track and surveil their citizens using AI systems with data from facial recognition systems paired with other tracking technologies. Body movement or gait analysis technology has been deployed already in Shanghai and Beijing, and perfectly complements facial recognition technology for this purpose. One company, Watrix, has software that can identify […]
What will facial recognition systems look like in five or ten years? Welcome to the first post in this whole biometrics series to consist entirely of idle speculation! After building up a basic description of the status quo, it’s time to extrapolate forward based on nothing more than intuition. Some trends are obvious: increasing resolution […]
In our previous posts we discussed using physical identifiers including facial recognition and other physical characteristics like eyes, fingerprints and veins for authentication and identification. But how does that help providers of online services know who is using the service? The answer might involve behavioral biometrics. Behavioral biometrics refers to specific behaviors that are tied […]
In the last post about biometric identification, “Fingers, Eyes & Veins” we looked at some of the technologies in use today, after an introduction to facial recognition in the previous post. Now let’s look at what governments are doing with the biometric data they’re collecting and using. They believe this will drive efficiency and fairness […]
Fingerprint readers are commonly used today to unlock smartphones, as well as providing a second factor in physical access control systems. In the previous post we took a look at facial recognition systems, now let’s introduce some other types of biometric identifiers commonly used today. Certain fingerprints will match a variety of similar prints; they […]
Facial recognition systems measure and match facial feature patterns to identify people. The only thing required in terms of sensors is a camera, so it is well suited for use with mobile phones and CCTV cameras. This technology works well with crowds of people as well as with individuals, so it is not only used […]
Authentication in computer systems means validating that you are who you say you are. There are many ways to authenticate users these days, and they have important implications for privacy. Username and password combinations are problematic, yet we don’t really have great alternatives at this point. Fingerprints and facial recognition systems are the most common […]