Mian Wei, a Chinese student at the Rhode Island School of Design, has created an experimental series of fake fingertips with randomly generated fingerprints that work with Apple and Android fingerprint authentication schemes, as well as many others.
Biometrics make for difficult authentication tokens. By their very nature, they tend to leak (as Wei points out, every Starbucks trashcan is filled with fingerprint-bearing cups that have their former owners' names on them), and once they do, there's no way to change them. As more entities demand the use of fingerprints from their users, the chances of one of those entities making a fatal error that leaks tens or hundreds of millions of fingerprints only increase.
Wei's prosthetic is called "Identity." Identity users are able to cycle out the fingerprints they use with authentication systems if they are worried that the old one has leaked. Though they were originally created for a year-end student show, Wei is now speaking to manufacturers about making them into consumer products.
In China, where Wei is from, citizens are required to register their fingerprints and it’s commonplace for people to lock their homes with fingerprint readers. “I think of the danger of fingerprint sensing as something we missed because of our craving for technological advancement,” he said.
Wei debuted his small, disposable finger prosthetic in May at a year-end RISD student exhibition. The Identity pad is made from a conductive silicone-based material, containing fibers that form an impression that will be accepted as a fingerprint on any consumer-grade fingerprint sensor.
Fake fingerprints: The latest tactic for protecting privacy
[Joshua Kopstein/CS Monitor]
Google has published the results of a study of the efficacy of standard anti-account-hijacking techniques like two-factor authentication (2FA), secret questions, and passwords: the good news is that when these are used, they are incredibly effective at stopping both automated and targeted attacks, including "advanced" attacks of the sort that are often characterized as unstoppable.
In 2014, Quentin Tarantino sued Gawker for publishing a link to a leaked pre-release screener of his movie "The Hateful Eight." The ensuing court-case revealed that the screeners Tarantino's company had released had some forensic "traitor tracing" features to enable them to track down the identities of people who leaked copies.
Ransomware has been around since the late 1980s, but it got a massive shot in the arm when leaked NSA cyberweapons were merged with existing strains of ransomware, with new payment mechanisms that used cryptocurrencies, leading to multiple ransomware epidemics that locked up businesses, hospitals, schools, and more (and then there are the state-level cyberattacks […]
Heads up: The clock is winding down on a free-entry contest to win not only one of the best smartphones on the market but a handy pair of earbuds. A simple sign-up is all you need to be eligible to win a 256 GB iPhone XS Max, along with AirPods. And while “free” is tough […]
Kudos to those of us who have chosen a less wasteful third option to “paper or plastic” at the supermarket or club stores. Tote bags are reusable, but they can be a pain to tote around. Here’s an upgrade to that planet-saving measure. The Club Cart Lotus Trolley Bag is that rare tote you’ll want […]
Looking for a career in IT, gaming or software development? In the ever-changing world of the internet, versatility is your biggest asset. In other words, mastering Java might not cut it in an interview if you don’t know C#. However, there’s a bundle that covers the essentials in most any language. The Legendary Learn to […]