Friday 25 November 2016

Biometric security

Biometric security features may not be as safe as they are thought to be
  In their rush to do away with problematic passwords, Apple, Microsoft and other tech companies are nudging consumers to use their own fingerprints, faces and eyes as digital keys. Smartphones and other devices increasingly feature scanners that can verify your identity via these "biometric" signatures in order to unlock a gadget, sign into web accounts and authorize electronic payments.


  But there are drawbacks: Hackers could still steal your fingerprint - or its digital representation. Police may have broader legal powers to make you unlock your phone. And so-called "biometric" systems are so convenient they could lull users into a false sense of security.

 "We may expect too much from biometrics. No security systems are perfect," said Anil Jain, a computer science professor at Michigan State University who helped police unlock a smartphone by using a digitally enhanced ink copy of the owner's fingerprints.

Bypassing the password

  Biometric security seems like a natural solution to well-known problems with passwords. Far too many people choose weak and easily-guessed passwords like "123456" or "password." Many others reuse a single password across online accounts, all of which could be hacked if the password is compromised. And of course some use no password at all when they can get away with it, as many phones allow.

  As electronic sensors and microprocessors have grown cheaper and more powerful, gadget makers have started adding biometric sensors to familiar products.
Jain, the Michigan State researcher, proved that earlier this year when a local police department asked for help unlocking a fingerprint. The phone's owner was dead, but police had the owner's fingerprints on file. Jain and two associates made a digital copy of the prints, enhanced them and then printed them out with special ink that mimics the conductive properties of human skin.

 
  But some experts believe any biometric system can be cracked with sufficient determination. All it takes are simulated images of a person's fingerprint, face or even iris pattern. And if someone manages that, you can't exactly change your fingerprint or facial features as you would a stolen password.

  To make such theft more difficult, biometric-equipped phones and computers typically encrypt fingerprints and similar data and store them locally, not in the "cloud" where hackers might lift them from company servers. But many biometrics can be found elsewhere. You might easily leave your fingerprint on a drinking glass, for instance. Or it might be stored in a different database. computer breach at federal Office of Personnel Management, which compromised the files - including fingerprints - of millions of federal employees.