Finger Prints Are Not Passwords
-
@thecreativeone91 said:
@scottalanmiller said:
Now read that again but replace the word "password" for fingerprint and guess what - the same security vulnerability
Passwords can be changed. No big deal.
Same deal. You can disable the use of biometrics if you know that they are compromised. The issue here is being able to shim inside the system. Once you can do that, the security game is over. Biometrics, passwords, whatever. Doesn't matter.
-
@scottalanmiller said:
@thecreativeone91 said:
It matters a lot when they can make replicas as well and make it look like you did something. That's why DNA based biometerics are even worse but, that's what the FBI/CJIS is pushing for.
In some ways that is true. But it becomes a game of getting the system to prove that it is the FINGER that is being used or that it knows a person is providing the DNA. Part of the issue here is that the SENSOR is not secure, not that the fingerprint is leaked. It's easy to jump to the conclusion that leaked fingerprints put us at risk, but that's not the risk. Your fingerprints are always out there, that has to be accepted. That's public data. It's that a system is set up to accept that but doesn't have a trust-worthy sensor that is the problem.
It's not just using sensors though. You have to think about people using this data to frame people for crimes etc.
-
@scottalanmiller said:
@thecreativeone91 said:
@scottalanmiller said:
Now read that again but replace the word "password" for fingerprint and guess what - the same security vulnerability
Passwords can be changed. No big deal.
Same deal. You can disable the use of biometrics if you know that they are compromised. The issue here is being able to shim inside the system. Once you can do that, the security game is over. Biometrics, passwords, whatever. Doesn't matter.
Yeah you go ahead and cut off your fingers, you can't change your finger prints. Disabling biometerics doesn't fix the stolen/compromised information.
-
@thecreativeone91 said:
It's not just using sensors though. You have to think about people using this data to frame people for crimes etc.
Still a matter of sensor trust. It's an identity. If you find fingerprints on a glass and claim that that means something (forensics) you are "trusting" an untrustworthy sensor. The issue is in trusting a sensor when you don't know what the source actually was.
-
@thecreativeone91 said:
@scottalanmiller said:
@thecreativeone91 said:
@scottalanmiller said:
Now read that again but replace the word "password" for fingerprint and guess what - the same security vulnerability
Passwords can be changed. No big deal.
Same deal. You can disable the use of biometrics if you know that they are compromised. The issue here is being able to shim inside the system. Once you can do that, the security game is over. Biometrics, passwords, whatever. Doesn't matter.
Yeah you go ahead and cut off your fingers, you can't change your finger prints. Disabling biometerics doesn't fix the stolen/compromised information.
How exactly does it not? If you have my fingerprints, how will you access my systems unless you have a shim already between the sensor and the security system that has to trust said sensor?
Give me an ACTUAL vulnerability here. I don't see one. I see a fear of identity being stolen, but the actual fear is in people trusting ID when there is no trustworthy sensor.
-
@scottalanmiller said:
@thecreativeone91 said:
It's not just using sensors though. You have to think about people using this data to frame people for crimes etc.
Still a matter of sensor trust. It's an identity. If you find fingerprints on a glass and claim that that means something (forensics) you are "trusting" an untrustworthy sensor. The issue is in trusting a sensor when you don't know what the source actually was.
How is that Sensor trust? Pulling a physical print has nothing to do with the sensor.
-
@thecreativeone91 said:
How is that Sensor trust? Pulling a physical print has nothing to do with the sensor.
The pulling of the fingerprints is a manual (human process) sensor. They don't have a trust worthy process because they only look to see what prints remain but do not observe them get collected from end to end. So it is a non-trustworthy process. There is no observation, only forensics, which is not at all the same thing. We know WHOSE prints are there but not WHO put them there.
-
@scottalanmiller said:
@thecreativeone91 said:
@scottalanmiller said:
@thecreativeone91 said:
@scottalanmiller said:
Now read that again but replace the word "password" for fingerprint and guess what - the same security vulnerability
Passwords can be changed. No big deal.
Same deal. You can disable the use of biometrics if you know that they are compromised. The issue here is being able to shim inside the system. Once you can do that, the security game is over. Biometrics, passwords, whatever. Doesn't matter.
Yeah you go ahead and cut off your fingers, you can't change your finger prints. Disabling biometerics doesn't fix the stolen/compromised information.
How exactly does it not? If you have my fingerprints, how will you access my systems unless you have a shim already between the sensor and the security system that has to trust said sensor?
Give me an ACTUAL vulnerability here. I don't see one. I see a fear of identity being stolen, but the actual fear is in people trusting ID when there is no trustworthy sensor.
Again, you are assuming the only place these will be used is on a sensor.
-
@scottalanmiller said:
@thecreativeone91 said:
How is that Sensor trust? Pulling a physical print has nothing to do with the sensor.
The pulling of the fingerprints is a manual (human process) sensor. They don't have a trust worthy process because they only look to see what prints remain but do not observe them get collected from end to end. So it is a non-trustworthy process. There is no observation, only forensics, which is not at all the same thing. We know WHOSE prints are there but not WHO put them there.
Okay? You can't change how forensics works just because people want to use finger print readers.
-
You're both technically correct
Sensor, password, whatever leaked there's an issue. My point is that passwords etc can be changed. Your identity shouldn't be used as a secure method of authenticating yourself to anything.
-
@thecreativeone91 said:
Again, you are assuming the only place these will be used is on a sensor.
What else are you intending? Your prints are public. That's a fact. You touch things all day long. That identity is out there. How many jobs require it?
Using fingerprints on your phone does not put you at more risk. If someone wants your prints, they will have your prints.
If your entire fear here is that people are going to use cool 3D printing technology to make fake finger print gloves and commit crimes, sure that's a problem, but that is one that exists and has nothing to do with the fear in this article and is purely a concern around criminal investigation departments using fingerprints via a non-trustworthy collection process (sensor) and making binding assumptions based on that untrustworthy information. It's a concern around an edge case with police departments and I don't see any connection to the concern in the article around fingerprints being "stolen".
-
@thecreativeone91 said:
@scottalanmiller said:
@thecreativeone91 said:
@scottalanmiller said:
@thecreativeone91 said:
@scottalanmiller said:
Now read that again but replace the word "password" for fingerprint and guess what - the same security vulnerability
Passwords can be changed. No big deal.
Same deal. You can disable the use of biometrics if you know that they are compromised. The issue here is being able to shim inside the system. Once you can do that, the security game is over. Biometrics, passwords, whatever. Doesn't matter.
Yeah you go ahead and cut off your fingers, you can't change your finger prints. Disabling biometerics doesn't fix the stolen/compromised information.
How exactly does it not? If you have my fingerprints, how will you access my systems unless you have a shim already between the sensor and the security system that has to trust said sensor?
Give me an ACTUAL vulnerability here. I don't see one. I see a fear of identity being stolen, but the actual fear is in people trusting ID when there is no trustworthy sensor.
Again, you are assuming the only place these will be used is on a sensor.
No, I'm assuming your prints are public. I want an example of what you are concerned about. If you have my prints, you can't use them to access anything, anywhere. Sure, you could, in theory, set up new accounts somewhere and claim to be me, but since my fingerprints don't give you access to anything of mine, you are no different than if we had a password collision. Doesn't impact me in any way.
-
@scottalanmiller said:
Now read that again but replace the word "password" for fingerprint and guess what - the same security vulnerability would impact passwords and create the same problem. The issue here is not that they got your fingerprint, but that the system vulnerability allowed ANY pass-system to be intercepted and replayed. That it is a fingerprint is inconsequential and, like everything coming out of the RSA conference, just pure hype. They add the "biometric" angle to get headlines. They leave out that the vulnerability would impact any security mechanism here.
Sure, but to the OPs point, using your identity as your password in general is horrible, and completely insecure. Yet we have devices doing just that, the iPhone and S5/S6 Galaxys.
-
@scottalanmiller said:
@thecreativeone91 said:
It's not just using sensors though. You have to think about people using this data to frame people for crimes etc.
Still a matter of sensor trust. It's an identity. If you find fingerprints on a glass and claim that that means something (forensics) you are "trusting" an untrustworthy sensor. The issue is in trusting a sensor when you don't know what the source actually was.
This is like judges trusting printed emails in court. This still absolutely floors me. It's so easy to fake a printout - so what does this tell you about our justice system?
-
@scottalanmiller said:
@thecreativeone91 said:
@scottalanmiller said:
@thecreativeone91 said:
@scottalanmiller said:
@thecreativeone91 said:
@scottalanmiller said:
Now read that again but replace the word "password" for fingerprint and guess what - the same security vulnerability
Passwords can be changed. No big deal.
Same deal. You can disable the use of biometrics if you know that they are compromised. The issue here is being able to shim inside the system. Once you can do that, the security game is over. Biometrics, passwords, whatever. Doesn't matter.
Yeah you go ahead and cut off your fingers, you can't change your finger prints. Disabling biometerics doesn't fix the stolen/compromised information.
How exactly does it not? If you have my fingerprints, how will you access my systems unless you have a shim already between the sensor and the security system that has to trust said sensor?
Give me an ACTUAL vulnerability here. I don't see one. I see a fear of identity being stolen, but the actual fear is in people trusting ID when there is no trustworthy sensor.
Again, you are assuming the only place these will be used is on a sensor.
No, I'm assuming your prints are public. I want an example of what you are concerned about. If you have my prints, you can't use them to access anything, anywhere. Sure, you could, in theory, set up new accounts somewhere and claim to be me, but since my fingerprints don't give you access to anything of mine, you are no different than if we had a password collision. Doesn't impact me in any way.
If I have your fingerprints I can't get into your iPhone? then I guess you're not using the sensor on your iPhone, good for you (I'm serious, good for you).
-
@Dashrender said:
This is like judges trusting printed emails in court. This still absolutely floors me. It's so easy to fake a printout - so what does this tell you about our justice system?
Or text messages http://www.ios7text.com/
-
@Dashrender said:
@scottalanmiller said:
@thecreativeone91 said:
@scottalanmiller said:
@thecreativeone91 said:
@scottalanmiller said:
@thecreativeone91 said:
@scottalanmiller said:
Now read that again but replace the word "password" for fingerprint and guess what - the same security vulnerability
Passwords can be changed. No big deal.
Same deal. You can disable the use of biometrics if you know that they are compromised. The issue here is being able to shim inside the system. Once you can do that, the security game is over. Biometrics, passwords, whatever. Doesn't matter.
Yeah you go ahead and cut off your fingers, you can't change your finger prints. Disabling biometerics doesn't fix the stolen/compromised information.
How exactly does it not? If you have my fingerprints, how will you access my systems unless you have a shim already between the sensor and the security system that has to trust said sensor?
Give me an ACTUAL vulnerability here. I don't see one. I see a fear of identity being stolen, but the actual fear is in people trusting ID when there is no trustworthy sensor.
Again, you are assuming the only place these will be used is on a sensor.
No, I'm assuming your prints are public. I want an example of what you are concerned about. If you have my prints, you can't use them to access anything, anywhere. Sure, you could, in theory, set up new accounts somewhere and claim to be me, but since my fingerprints don't give you access to anything of mine, you are no different than if we had a password collision. Doesn't impact me in any way.
If I have your fingerprints I can't get into your iPhone? then I guess you're not using the sensor on your iPhone, good for you (I'm serious, good for you).
If you had my fingerprints AND you had my iPhone AND I used fingerprints for iPhone access.... how would you get into my iPhone? Are you planning to use a really intense 3D printer to print copies of my finger?
While theoretically possible, is this practically possible? There are probably far easier ways to break into my iPhone if you had physical access to it like that. Like pulling the storage out of it and brute forcing the encryption. You are talking about a pretty major security effort here, one that breaches the key rule of security - it is harder to crack than the value of the data is. Nothing is impenetrable, that's never the point. The point is to make things practically useless to break into and I think that this clearly qualifies.
-
@thecreativeone91 said:
@Dashrender said:
This is like judges trusting printed emails in court. This still absolutely floors me. It's so easy to fake a printout - so what does this tell you about our justice system?
Or text messages http://www.ios7text.com/
I worked at a hotel in the 1990s that would access any coupon printed out at home that had the name of the hotel on it. They told us to accept anything after some of us had turned down people using coupons that they had printed out themselves and did not match any promotion that we had.
So one of my coworkers, @AndyW started printing out "one week free stay" coupons for management to see that looked more official than official ones. They started reconsidering once anyone could hand out free ANYTHING coupons anytime.
-
@Dashrender said:
Sure, but to the OPs point, using your identity as your password in general is horrible, and completely insecure. Yet we have devices doing just that, the iPhone and S5/S6 Galaxys.
I agree but only for legal reasons, not security ones. (Policy can force you to use identity but not passwords to access devices, for example.) Passwords "prove" approval, not just identity. However, in many cases, outside of quirky legal issues, I'd prefer that my devices know it was me rather than know that I approve.
For example, if I lose my memory I'd still like ME to have access to my devices, even if I can no longer provide approval.
-
And I mean amnesia, my human memory, in the case above.