Toggle light / dark theme

WEF: These are the technologies that will transform finance over the next few decades

Like this article; there is 2 more pieces missing from the roadmap for 2010 & beyond and that is Biocomputing & Singularity. Biocomputing will provide the financial industry (banks, trading firms, accounting & audit firms, bond insurers, etc.) the ability to expand information/ data storage and transmission capacities like we have never see before just look at what Microsoft, Google, Amazon, etc. have done with DNA storage. And, the much loved Singularity enables boosting of knowledge and insights as well as more mobility and access to information as they need it. BTW — Biometrics is NOT the same as Biocomputing; biocomputing goes well beyond security/ identity management.


The influential non-profit rates these technologies alongside the PC, the internet, and smartphones in terms of their potential to transform financial…

MP scamsters find a way to clone thumbprint, beat biometric test

Why biometrics will need and form of id to properly perform security checks.


Impersonators in many cases apparently had used synthetic bandages bearing thumb impressions of actual candidates. “Traditionally, fingerprints were used as evidence in court cases and even in high-tech security systems. But revelations by those arrested for impersonation in Bihar are proving to the world of forensic sciences that creating forged, latent fingerprints is relatively easy,” claims Dr Anand Rai, whistle-blower in the MPPEB scam. In the past, Rai had requested STF officials to look into interrogation reports of 140 impersonators arrested by the Bihar police during a constable recruitment exam.

Source: http://timesofindia.indiatimes.com/city/bhopal/MP-scamsters-…311540.cms

BioCryptography and Biometric Penetration Testing

I do love biometrics for security; however, many know that we will not only leverage biometrics alone for certifying identification given how easy it is for folks to retrieve others DNA information, etc. from commercial DNA sites, etc.


In the world of security, there are many tools at the IT Staff’s disposal which can be used to fight Cybercrimes of all types and levels. Regarding Physical Access Entry, Smart Cards and FOB’s are available to help alleviate the probability of a Social Engineering attack. Regarding Logical Access Entry, Network Intrusion Devices, Firewalls, Routers, etc. are also all ready to be installed and used.

But, there is one problem with all of these tools above: To some degree or another, all of them can be hijacked, stolen, or even spoofed so that a real Cyber hacker can find their way into a corporation very quickly and easily. For instance, a Smart Card can be easily lost or stolen; or even malformed data packets can be sent to a router and tricking it that it is a legitimate employee trying to gain access.

But, there is one Security technology out there which, for the most part, cannot be spoofed or tricked. As a result, it can provide 100% proof positive of the identity of an end user. This technology is known as Biometrics.

‘Who are you wearing?’ gets literal with DNA-based fashion

This will definitely make designer wear fashion very collectable and easier for investigators and consumer to detect fakes due to biometric readers. Unfortunately, Coco Chanel and Gianni Versace are not around to participate.


Designer Tina Gorjanc is using Alexander McQueen’s DNA to grow “skin” complete with freckles and tattoos that will be tanned to create jackets and bags.

Google Tinkers With Chrome Cryptosecurity To Fight Quantum Hacks

Glad Google is doing this because next month could be a real test when China launches its Quantum Satellite.


Today’s encryption is an arms race as digital security experts try to hold off hackers’ attempts to break open user data. But there’s a new tech on the horizon that even the NSA recognizes as crucial to protect against: quantum computing, which is expected to dramatically speed up attempts to crack some commonly-used cryptographic schemes. To get ahead of the game, Google is testing new digital security setups on single-digit populations of Chrome users.

Quantum computing is such a potential threat because it can do many more simultaneous calculations than current computers. Modern binary bits can only be in two states when electric current is run through them: 0 or 1. But the ambiguous nature of the quantum state means its elemental units (known as “qubits”) could be in either state at a time, so two could potentially be in four orientations at one time: 00, 01, 10 or 11. That ambiguity is exponential, so three qubits could be in eight at a time, and so on.

Security experts aren’t just concerned that quantum computers’ higher speed means faster rates of cryptography-cracking: They’re worried that future hacking methods could come back to today’s encrypted data and pry it open. But that’s in the future: as Wired points out, crypto experts say you would need a quantum computer with hundreds of thousands of qubits, and IBM’s only has five.

NSA to stand trial for spying on convicted bomber without warrant

You got to luv this one.


The security agency must defend itself in a US appeals court for violating the rights of a convicted bomber by supposedly illegally spying on him.

A US appeals court will weigh a constitutional challenge on Wednesday to a warrantless government surveillance program, brought by an Oregon man found guilty of attempting to detonate a bomb in 2010 during a Christmas tree-lighting ceremony.

The case before a three-judge panel of the 9th US Circuit Court of Appeals is the first of its kind to consider whether a criminal defendant’s constitutional privacy rights are violated under a National Security Agency (NSA) program that allows spying on Americans’ international phone calls and internet communications.

ODNI wants help securing biometric systems

Glad they are doing something on this because my biggest concern on biometrics and systems storing other people’s DNA/ bio information is criminals hacking in and collecting bio information on people and reselling it on the Dark Web. With this type of information; criminals can do many interesting things especially if they have access to a gene editing kit, or 3D printers, etc. We have seen how easy it is to create gene editing kits and selling them on the net for $129 each. And, how 3D printers can replicate synthetic skin, contacts mimicking eye structures, etc. So, criminals can do some amazing things once they have access to anyone’s biometrics information.


A biometric system to verify travelers exiting the country could be in effect as soon as 2018.

By Kayla Nick-Kearney.

Media Reports: Xinjiang Residents Must Present DNA To Obtain Passports

Biometrics using DNA along with other recognition technology brings additional identity protection; however, is it just me or are others understanding the risk with our DNA and other bio info being online given the existing weak infrastructure and under pinning technology. Without a QC secured internet and infrastructure; I would hesitate having my bio/ DNA information online for hackers and terrorists.

Once your identity with the DNA is online; it will be extremely hard to do a reset button on your identity because things like an id number such as a US Social Security number, etc. can be changed; but DNA identity is not that achievable even with CRISPR.


The official Yili Daily reported that from the first of June, residents of the Yili Kazakh Autonomous Prefecture in China’s far northwest must present the police with DNA samples, fingerprints, voice prints and a “three-dimensional image” when applying for travel documents.

Members of the majorly Muslim Uighur community in Xinjiang complain of discrimination, especially facing denials of passport applications including limits placed on their culture and religion.

Based on the paper, the new policy that came into effect before the commencement of the holy month of Ramadan which started on Monday, refers to applications for and renewals of passports, entry permits to Taiwan and two-way permits to Hong Kong and Macau.

/* */