Home » today » Technology » Using biometrics to prove identity in an era where our identity is easily stolen

Using biometrics to prove identity in an era where our identity is easily stolen

Nowadays, you set up smartphone unlocking andappdifferent applications on your device in any way? Actually, I really believe that because different brands of smartphones have an “unlock by scanning fingerprint” or “unlock by scanning face” function

Many people also choose to use their own scanning method of these organs to unlock their personal phones. Instead of having to remember passwords, pin codes, or even remember drawing patterns, scanning is much easier and faster. We can enter the phone screen in a split second. and there is no need to remember any code unless the system is locked by the scan method. This was due to an error he was trying to unlock multiple times. To have to remember the country what is the password of the machine.

This is just one example of the use of technology. Biometric in everyday life that is closest to us Today this technology is widely used. To help protect in many ways besides the smartphone unlocking feature The technology is also used in other areas, one of which is very close to the scheduling of human resources (presence of fingerprints) and company payroll.

What is biometric technology?

In terminological terms, the word biometric is composed of the words bio, which means living organisms, and metric, which refers to attributes that can be measured or quantified. It refers to the technology to use certain attributes or behaviors in organisms that are unique. and can compare, measure or count to combine with statistical principles for the benefit of distinguishing, remembering, confirming and identifying the individual. It has more than 20 unique identifiers. which can basically be divided into two types:

  • Physical features such as fingerprints, palm veins, palm, retina, iris, face, DNA and smell.
  • Behavioral traits such as sounds, signatures and typography

Biometric data is the physical characteristics of a person such as fingerprints, facial features, iris, voice, as well as the unique behavior of the individual. do this We use biometrics as a technology to verify or authenticate a person. Taking physical characteristics such as fingerprints, pupils and facial structure. o Individual behaviors such as walking style Hand movements and speech sounds are used for classification. By examining the physical characteristics and information technology together.

the uniqueness of information Therefore, it is unique that no human being has the same. Identical twins also have their own traits that the other twin does not have, such as fingerprints and iris. Twins are not the same to look at with the eyes Since the external appearance is so similar that they are almost identical, but in reality they are not the same, the biometric data is separable, making biometric a highly secure system. difficult to counterfeit anti lost and with high accuracy Therefore, it is widely used to protect data or assets that require high security.

However, there was once a case of a famous mobile phone brand. Which uses Face ID technology to unlock faces, but Face ID creates a story because “inseparable twins” allow another twin who isn’t registered with Face ID to unlock the device for use. Even if the reality shouldn’t be like that

It is therefore interesting how much Face ID can actually tell the difference between similar faces if the Face ID system is unable to differentiate the faces of the twins. Does this mean that the security of Face ID technology may be lower than other biometric security systems such as fingerprint scanning or iris scanning?

Biometric data is not that personal.

Today we find that biometric technology is widely used. in particular the advantages of authentication / identification and the protection of information or assets that require high security As we have commonly used in everyday life. How to unlock various electronic devices and access financial transactions. Because it is the information that reduces the risk of being hacked and forged. Currently, biometric technology is being developed to be more accurate. reduce errors

However, one thing to keep in mind is that biometrics are not that personal, in other words, most of us upload our “face” selfies to social media. When they review various attractions, they also take a clip they see. Furthermore, in the course of our life we ​​have hundreds of documents with our “signatures”. Indeed, it is possible to access this biometric data. It is very easy and accessible from anywhere. Because it is we who have created these identities in the online world (virtual world) by ourselves.

With ordinary people, there may not be much to do with this information. But for all cybercriminals It is not certain. Our existence on the Internet All of our physical properties can be accessed by criminals via photos and videos uploaded by us. And the hacker level may be able to capture our most obvious facial image data to scan it into some system. or a 2-inch photo if the hacker zooms in and clearly sees our fingerprints he might also be able to take our fingerprints to scan into the system anywhere In this case, there was a warning recently.

Since the introduction of facial recognition or facial scanning technology The past period can be improved to be more efficient. Reduce spoofing vulnerabilities It’s like you can’t use a photo or animation from a video to scan and unlock it. but in reality, hackers are no less knowledgeable about these technologies than those trying to block vulnerabilities from spoofing. Good or bad can be the same person. It’s the same with a joke from a long time ago. that the person who created the computer virus and the person who created the antivirus program can be the same person. He is the person who brought out the virus. and then create their own antiviral drugs Once infected with the virus, they will come for treatment and buy medicines.

For example, the former Face ID technology of a famous mobile phone brand. This technology was once guaranteed to be very secure, with only a 1 in 1,000,000 chance of failure. Even if users wear hats, wigs, glasses, makeup and beards, they can still be scanned with facial recognition technology that already recognizes our faces. And you can’t use photos or videos to scan to unlock, while the Touch ID system has an error rate of up to 1 in 50,000. However, the worst mistake that has ever happened to Face ID is to separate the faces of the twins. not out yet!

Therefore, an experienced hacker might attempt to break through the defenses. “We cannot use photos or videos to scan to unlock” and then use photos or videos with our faces to scan to unlock later. It shouldn’t be difficult for cybercriminals. We may have fingerprints, faces or voices. But we’re not the only ones with access to those unique personal items. Since we are the ones who upload part of our identity to the Internet ourselves!

So, think carefully before choosing biometric data, because unlike hacked passwords where we can change them if damaged, but biometric data we cannot change for life. if stolen It is as if we have been robbed for the rest of our lives. It is permanent damage that cannot be recovered.

Comfortable but really safe?

Biometric is considered a type of sensitive information. “Biodata” means “personal data generated by technology in connection with the adoption of physical or behavioral characteristics of a person that allow the identification of that individual with respect to any other person”, Article 26. Law on personal data The law therefore provides a special protection because it is a true personal identity. if disclosed incorrectly There is a risk of being treated unfairly, including identity theft. The law, therefore, clearly states that it is “forbidden” to collect without the “express” consent of the interested party.

In the beginning, biometric technology was widely used. Many people already understand that it is the safest technology. because only we have a face like this have this iris There is an imprint like this. There is DNA like this that can be scanned or verified to unlock, log in or whatever. It is very personal.

But when it really works We are starting to see that there are still many vulnerabilities. which requires both the improvement and development of technology to fill the gaps to use it more efficiently. Also in matters of law to protect this data. which can be smuggled and used without authorization and cause damage

Take, for example, using your fingerprint or face to unlock your phone, which often contains our personal data. It appears to be safe because only we can use our organs to scan and unlock our personal phones. But what we may have seen in dramas or movies is when a character is in a deep sleep or faint. An evil character can grab the owner’s finger and scan it to unlock that phone in a split second. Or forced to make a straight face, put the phone in front of your face. The device has been unlocked.

indeed If it is a simple password lock set or a way to draw a pattern and never tell anyone what the unlock code is. It wouldn’t be easy to unlock that phone in a split second. Random guess, entering the wrong password more than once. may cause the device to lock Access may be restricted for a long time.

However, if the bad guys don’t have our biometrics, it also helps us to be very safe from remote systems or remotely controlling devices. In case of hackingappScammers control our machines by sending us strange links, which may contain spyware or requests for permission to open the attached remote control. Using a password or pin or pattern they will be intercepted by spying. But we cannot work via biometrics because only one of us can scan our organs through the device we have set up.

It is true that the biometric data we use to open the app and unlock the device is very secure in most cases. Because it is very private. However, our identity on the Internet is prone to hacking. And these methods get complicated over time, so it might be best for us to compromise. Then enable two-step authentication, using Biometric with a strong password. Code is something we can change whenever we want. especially when you feel insecure. Focus on creating strong and secure passwords to improve security.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.