Crazy thing in all the time. To handle on the lines in times of the current a pandemic d. W. Reporter keep your job or is it just like everyone else and shes looking for answers thankfully with the help of too many expect. Thank you is not life as we know it with. Our new web series. Title. My fingerprint my face the way i move all of these can be turned into a unique biometrics and be used to identify me for example for making online payments but how secure is this technology really today on shift. When i wait at this spot a system regine. Fetes and thats the bomb uno which customer is next in line ive never found my face war useful i use my fingerprint to unlock my phone and to get access to this high security area a computer 1st needs to scan my body movements biometrics i increasingly replacing typical passwords and access keys for example. Biometric systems can recognize a persons specific physical attributes their fingerprints facial features. The technology is already used around the world by the somali army doctors and for authenticating patients for important drugs or for Online Banking month smartphones. Even systems that look. To speak such as infrared scanners that are used in vein matching oxygen for blood absorbs more infrared light than surrounding tissue so the patterns can be matched. Scientists are currently developing technology that can recognize a person on the basis of their heartbeat. Others are working on identifying a person brain waves. Sounds like biometrics super practical need those endless letter number and character password combinations happy days or is there a catch we talk to professor christophe minor to find out he teaches Internet Technologies and systems at a part of them based Research Institute whats more secure professor my passwords biometrics. Using your fingerprint. You just put your finger on the reader are identified and. Thats much easier than typing a pos word. Get halfway there a little. Protected systems are easy to implement thats probably why theyre so common. Thats a cost as you may has and so im the most sense as i can use to scan a fingerprint or face the more accurately i can capture someones biometric profile for. The security of this Technology Depends on how well its implemented or if there are enough senses this is more secure than passwords to find out. Solution talk Iris Recognition fingerprint scans and facial recognition similar in the sense that the old check for a single constant biometric feature or. Which the system recognizes me for a password by contrast is something i need to memorize i should write it down anywhere because otherwise anyone who finds it can pretend to be me. The future is a multi factor authentication or at least 2 factor authentication of code and i think that ultimately the most user friendly systems will be the ones used the most been exchanged. So biometric identification is convenient but is our personal data Safe Companies using this tech have to ensure that biometric data is securely stored and encrypted ideally and user devices and not some clout just makes it hard of a hacker to get to unfortunately thats not always the team of israeli researchers managed to hack into a 23 gigabyte database with over 27000000 records containing fingerprints facial profiles and much more but of course possible databases have also been compromised beyond large scale hacks thats also a risk of individuals systems and devices being cracked and im a bit worried about how successful hackers have been at our wedding biometrics. Password can be stolen someone can watch it enter it somewhere or find where you wrote it down or even just get it this cant happen with biometric identification tag biometrics are convenient and save users from having to remember passwords. But unlike past. You cant change your biometric data if its been hacked. And under Lab Conditions hackers have managed to outsmart biometric encryption technologies. For instance they duped an i phone fingerprint scanner using a fingerprint lifted from a glass. And combining a picture of a persons iris with a contact lens got them past a Samsung Phone iris scanner. Packers from germanys Chaos Computer Club have developed a wax hand that fooled a palm vein scanner. And chinese hackers spoofed apples face ideal life in its Detection Technology with just a pair of glasses and some tape. We should stress all these hacks were carried out under Lab Conditions the quality of a system sensors largely determines how safe it is which means smartphones are easier to outwit than elaborate Security Systems. Clearly biometrics arent as safe as you might think even though a scenario like taking a fake wex hand along to break into a high security area isnt very realistic either still many Tech Companies keep rolling biometric security features the latest apple and googles models for example let you make payments using facial recognition tech for the convenient but is not personal data safe with these companies and what if companies or states get too nosy. In Great Britain c. C. T. V. Cameras are ubiquitous the average londoner is caught on camera 300 times every day but if facial Recognition Technology were applied to analyze that c. C. T. V. Footage. Surveillance cameras are widespread in britain and london has been called europes c. C. T. V. Capital. People have even begun using them independently of the authorities. Because you can go on facebook get peoples profile images and easy upload them onto it on software criminals etc in the place uploaded images all over the life you can pick up the. Security system and that person crosses your cameras your system picks it up so its not easy perhaps but its also an invasion of privacy in britain many are used to c. C. T. V. Cameras but since authorities have started combining surveillance cameras with facial recognition tech some say this goes too far people like bridges from cardiff who recently made a shocking discovery the van was parked just around the corner and the by the time i was close enough to see facial Recognition Technology written on the phone it had already captured my data several times over and i felt like an invasion of my privacy im a law abiding member of the public i was going about my daily business i wasnt committing any crime i was no threat to anyone and yet the police were there filming me and capturing my data is actually. Bridges took the police to court and lost hes currently appealing that ruling but for now Police Continue to use their tactic scanning hundreds of faces per 2nd checking them against wanted list. We are developing and there are actually people being taken off the streets who are wanted for offenses or court direct result of the deployment of this technology. The question remains if you really justify the means. If you ask me we should all be wary of handing out our biometric data i wonder if the convenience outweighs the potential risks resurges already working on socalled cans little biometrics here the biometric data is encrypted before its stored in a nutshell this means that not my actual face is thought but a digitally altered version if anyone has the system i can delete my data and create a new biometric password that sounds pretty good and there are even more options like behavioral biometrics here smartphones and wearables analyze how we type or the way you walk for example. Theres a software that captures how fast we walk the length of our steps and ahead movement and uses this data to create a Movement Profile by which it authenticates us the smartphone can then communicate with a gate for example and unlock it when we approach. Them but if your movement doesnt match the profile the door will remain locked simple behavioral sequences such as how you get your smartphone out of your pocket can be enough to identify him. In finding and tying this technology into everyday movements can be very convenient because you wouldnt have to do anything to authenticate yourself if. The software can tap into your smartphones and wearables sensors. Then it calculates a trust level based on your behavior. This means it assesses the odds that its really you using the device and not some stranger. I dont fall out. Of the vietnam digital biz behavioral system is that the other party does not actually need to say your Movement Profile. Or for you this data is only registered by your smartphone thats where the trust storys calculated if and only if the scores shared with the Service Providers will pass out good. Service. This means your phone alone registers your movements no sensitive private data is saved on a cloud or shared with a Service Provider that makes this method particularly secure. Put an end to the big problem we currently have with legal password files and leaks by metrical data that will cyber criminals are selling the states online by using behavioral profiles this problem would disappear overnight. Behavioral Security Technology and monte factor authentication are very secure as a rule of thumb the more elaborate the security method and senses the better but so far hackers have always managed to crack by a measurable Security Systems and a Lab Conditions facial recognition fingerprint scan us pounding recognition nothing is 100 percent safe which doesnt mean we should be going back to passwords because these also get stolen plus many people think 2 factor authentication is a hassle and thats that we should think carefully about if we want to use by a measurable passwords at all and which companies we trust with this Sensitive Information what do you think things like using a fingerprint for Online Banking a great idea or pretty reckless let us know here as well from me bye bye. Take me to me and get you in her early twentys he was the one you could hear him go was a victim of domestic abuse. It works in most slums of nairobi interpol selfdetermination for women. Also supportive of. Age Information Programs in schools and campaigns for womens rights. Over 3000. On t. W. Story so that people will hold on for g. W. On facebook and twitter up to date and in touch. How does a virus spread. Why do we panic and when well all miss. Just 3 of the topics covered and a weekly radio show is called spectrum if you would like any information on the coronavirus or any other science topic you should really check out our podcast so you can get it wherever you get your podcast you can also find us at. And slash science. Welcome to global 3 sounds and harassment and Sexual Violence are all too commonplace for many women around the world in japan for example women are often groped in overcrowded trains most suffer in silence but theyre beginning to fight back. In one of nairobis poorest districts a young woman is raising awareness about gender violence. And the daughter of an indian Billionaire Office might play fine