Does US Army Really Want to Bring Down Security?

US Army looks to use soldiers’ biometric data to secure wearable tech
The US Army appears to be misguided.
We would not need to worry much if they intend to deploy biometrics for ‘IDENTIFICATION’ of soldiers.
We would have to worry a lot if they intend to deploy biometrics for ‘AUTHENTICATION’ of soldiers.
Contrary to the widespread misperception, biometrics used for authentication would only lower the digital identity security as demonstrated in this video - Biometrics in Cyber Space - "below-one" factor authentication https://youtu.be/wuhB5vxKYlg
and closed examined in this article – Negative Security Effect of Biometrics Deployed in Cyberspace
https://www.linkedin.com/pulse/negative-security-effect-biometrics-deployed-hitoshi-kokumai/
Should you have any contact with someone at US Army, you would be requested to convey this warning to them before it is too late.

It was in 2001 on the website of a globally reputed electronics manufacturer that I first noticed this awkward phenomenon. They alleged that their face biometrics was going to displace the password. It immediately occurred to me what we could do when the system failed to recognize us. I quickly started to search for an answer on their website and found a brief statement in a Q&A corner "Don't worry if you are not recognized. You can get logged in by feeding the password that you had registered earlier".

The second encounter came a few months later at a security conference where another global brand hung a large poster reading "Farewell to Password by Fingerprints". I asked an attendant "What can we do when rejected by the fingerprints sensor?", to which he replied "Don't worry. You can rescue yourself by feeding the password that had been registered earlier". I raised the next question "Then, how would it be possible for you to allege "Farewell to Password by Fingerprints?” The attendant turned silent and never opened his mouth again. I gave up and left there.
It has been as such since 2001 and still is.
Hitoshi Kokumaiの記事
ブログを見る
There is actually a valid methodology that enable us to maximize the entropy of the secret credentia ...

Some friends directed my attention to this news report - · “Biometric auth bypassed using fingerpri ...

I would like to take up this somewhat puzzling report - “Google advises passwords are good, spear ph ...
コメント
mohammed khalaf
4年前#3
Debesh Choudhury
4年前#2
Debesh Choudhury
4年前#1