БЛОГ

Archive for the ‘privacy’ category: Page 22

Jul 26, 2016

“Honey Onions” probe the Dark Web: at least 3% of Tor nodes are rogues

Posted by in categories: futurism, privacy

How many rogue nodes are there in Tor’s anonmity and privacy network? “Honey Onions” are a way of finding out.

Read more

Jul 21, 2016

MP scamsters find a way to clone thumbprint, beat biometric test

Posted by in categories: privacy, security

Why biometrics will need and form of id to properly perform security checks.


Impersonators in many cases apparently had used synthetic bandages bearing thumb impressions of actual candidates. “Traditionally, fingerprints were used as evidence in court cases and even in high-tech security systems. But revelations by those arrested for impersonation in Bihar are proving to the world of forensic sciences that creating forged, latent fingerprints is relatively easy,” claims Dr Anand Rai, whistle-blower in the MPPEB scam. In the past, Rai had requested STF officials to look into interrogation reports of 140 impersonators arrested by the Bihar police during a constable recruitment exam.

Source: http://timesofindia.indiatimes.com/city/bhopal/MP-scamsters-…311540.cms

Continue reading “MP scamsters find a way to clone thumbprint, beat biometric test” »

Jul 21, 2016

BioCryptography and Biometric Penetration Testing

Posted by in categories: biotech/medical, cybercrime/malcode, engineering, privacy

I do love biometrics for security; however, many know that we will not only leverage biometrics alone for certifying identification given how easy it is for folks to retrieve others DNA information, etc. from commercial DNA sites, etc.


In the world of security, there are many tools at the IT Staff’s disposal which can be used to fight Cybercrimes of all types and levels. Regarding Physical Access Entry, Smart Cards and FOB’s are available to help alleviate the probability of a Social Engineering attack. Regarding Logical Access Entry, Network Intrusion Devices, Firewalls, Routers, etc. are also all ready to be installed and used.

But, there is one problem with all of these tools above: To some degree or another, all of them can be hijacked, stolen, or even spoofed so that a real Cyber hacker can find their way into a corporation very quickly and easily. For instance, a Smart Card can be easily lost or stolen; or even malformed data packets can be sent to a router and tricking it that it is a legitimate employee trying to gain access.

Continue reading “BioCryptography and Biometric Penetration Testing” »

Jul 18, 2016

‘Who are you wearing?’ gets literal with DNA-based fashion

Posted by in categories: biotech/medical, privacy

This will definitely make designer wear fashion very collectable and easier for investigators and consumer to detect fakes due to biometric readers. Unfortunately, Coco Chanel and Gianni Versace are not around to participate.


Designer Tina Gorjanc is using Alexander McQueen’s DNA to grow “skin” complete with freckles and tattoos that will be tanned to create jackets and bags.

Read more

Jul 8, 2016

Google Tinkers With Chrome Cryptosecurity To Fight Quantum Hacks

Posted by in categories: cybercrime/malcode, encryption, privacy, quantum physics

Glad Google is doing this because next month could be a real test when China launches its Quantum Satellite.


Today’s encryption is an arms race as digital security experts try to hold off hackers’ attempts to break open user data. But there’s a new tech on the horizon that even the NSA recognizes as crucial to protect against: quantum computing, which is expected to dramatically speed up attempts to crack some commonly-used cryptographic schemes. To get ahead of the game, Google is testing new digital security setups on single-digit populations of Chrome users.

Quantum computing is such a potential threat because it can do many more simultaneous calculations than current computers. Modern binary bits can only be in two states when electric current is run through them: 0 or 1. But the ambiguous nature of the quantum state means its elemental units (known as “qubits”) could be in either state at a time, so two could potentially be in four orientations at one time: 00, 01, 10 or 11. That ambiguity is exponential, so three qubits could be in eight at a time, and so on.

Continue reading “Google Tinkers With Chrome Cryptosecurity To Fight Quantum Hacks” »

Jul 6, 2016

NSA to stand trial for spying on convicted bomber without warrant

Posted by in categories: government, internet, mobile phones, privacy, security, surveillance

You got to luv this one.


The security agency must defend itself in a US appeals court for violating the rights of a convicted bomber by supposedly illegally spying on him.

A US appeals court will weigh a constitutional challenge on Wednesday to a warrantless government surveillance program, brought by an Oregon man found guilty of attempting to detonate a bomb in 2010 during a Christmas tree-lighting ceremony.

Continue reading “NSA to stand trial for spying on convicted bomber without warrant” »

Jun 28, 2016

ODNI wants help securing biometric systems

Posted by in categories: 3D printing, bioengineering, biotech/medical, privacy

Glad they are doing something on this because my biggest concern on biometrics and systems storing other people’s DNA/ bio information is criminals hacking in and collecting bio information on people and reselling it on the Dark Web. With this type of information; criminals can do many interesting things especially if they have access to a gene editing kit, or 3D printers, etc. We have seen how easy it is to create gene editing kits and selling them on the net for $129 each. And, how 3D printers can replicate synthetic skin, contacts mimicking eye structures, etc. So, criminals can do some amazing things once they have access to anyone’s biometrics information.


A biometric system to verify travelers exiting the country could be in effect as soon as 2018.

By Kayla Nick-Kearney.

Read more

Jun 21, 2016

IARPA Wants To Stop You From Spoofing Facial Scans and Fingerprints

Posted by in category: privacy

The intelligence community’s R&D group wants technology that can detect attempts to evade biometric collection.

Read more

Jun 16, 2016

Media Reports: Xinjiang Residents Must Present DNA To Obtain Passports

Posted by in categories: biotech/medical, internet, policy, privacy, terrorism

Biometrics using DNA along with other recognition technology brings additional identity protection; however, is it just me or are others understanding the risk with our DNA and other bio info being online given the existing weak infrastructure and under pinning technology. Without a QC secured internet and infrastructure; I would hesitate having my bio/ DNA information online for hackers and terrorists.

Once your identity with the DNA is online; it will be extremely hard to do a reset button on your identity because things like an id number such as a US Social Security number, etc. can be changed; but DNA identity is not that achievable even with CRISPR.


The official Yili Daily reported that from the first of June, residents of the Yili Kazakh Autonomous Prefecture in China’s far northwest must present the police with DNA samples, fingerprints, voice prints and a “three-dimensional image” when applying for travel documents.

Continue reading “Media Reports: Xinjiang Residents Must Present DNA To Obtain Passports” »

Jun 15, 2016

Global Biometrics Market Worth US$ 24.8 Billion by 2021 — Vein Scanner to Outpace Fingerprint Recognition Biometrics — Research and Markets

Posted by in categories: computing, government, information science, mobile phones, privacy, security

All is promising for Biometrics and biometric informatics; however, the technologies to date leveraged in IoT and other environments for parsing, analysis (especially predictive analysis), as well as better presented needs to be improved to be of value. We have seen great progress in the collection of the information and for some basic identification capabilities it looks good; however, to truly be effective and of value we need a lot more work done in this space especially when you look at today’s landscape of collecting information in areas of IoT and processing/ analysis with big data.


The global biometrics market is projected to cross US $ 24.8 billion by 2021. Fingerprint recognition biometric systems are the most preferred type of biometric systems used across the globe, owing to their ease of use, low cost, high speed and accurate results.

Biometric systems are used across various public as well as private offices for enhancing the security of data and information, as these systems provide an accurate validation as compared to traditional methods such as ID cards, PINs, passwords, etc. Increasing use of biometrics in e-commerce and cloud computing solutions, coupled with initiatives taken by the government of various countries across the world to adopt biometrics systems for identification and verification purposes are some of the major factors driving demand for biometric solutions, globally.

Moreover, introduction of e-passports and e-visas, use of biometrics in criminal identification, increasing demand for smartphones integrated with biometric technologies and implementation of biometric technology in election administration are anticipated to drive the global biometrics market over the next five years.

Continue reading “Global Biometrics Market Worth US$ 24.8 Billion by 2021 — Vein Scanner to Outpace Fingerprint Recognition Biometrics — Research and Markets” »

Page 22 of 30First1920212223242526Last