SlideShare a Scribd company logo
1 of 2
- Misuse in Cyberspace of Biometrics Discussed on Media -
Elsevier's "Biometric Technology Today" has published an article of mine titled
"Biometrics: great technology for physical security, probably big mistake for cyber
security?" in the May/2016 issue as announced at
http://www.sciencedirect.com/science/article/pii/S0969476516300881
The conclusion of the article is “In summary, based on this analysis, in most cases
authentication by biometrics provides poorer security than pincode or password-only
authentication. And given that a false sense of security is often worse than the lack of
security, I would like to put forward these suggestions: the vendors of smart devices
who are conscious of the privacy and security of consumers could tell consumers not to
turn on the biometric functions; consumers who are concerned about their privacy and
security could refrain from activating the biometric backdoors; and the deployment of
biometric solutions could instead be recommended where consumers can accept ‘below-
one’ factor authentication in return for better convenience.”
-------------------------------------------------------
Similar articles of the same tenor have been published or taken up by
- Payments Journal: Misuse of Biometrics Technology
http://www.paymentsjournal.com/Content/Blogs/Industry_Blog/30986/
- Information Security Buzz: Misuse of Biometrics – Blind Spot in Our Mind and
False Sense of Security
http://www.informationsecuritybuzz.com/articles/misuse-biometrics-blind-spot-mind-
false-sense-security/
- SC Magazine UK (1): False sense of security spreading on a gigantic scale
http://www.scmagazineuk.com/false-sense-of-security-spreading-on-a-gigantic-
scale/article/478372/#disqus_thread
- SC Magazine UK (2): Biometrics deployed with a fallback password: statistics on false
sense of security
http://www.scmagazineuk.com/biometrics-deployed-with-a-fallback-password-statistics-
on-false-sense-of-security/article/485434/
- Forbes: Even Poor Biometrics Are Better than No Security At All
http://www.forbes.com/sites/tonybradley/2016/03/21/even-poor-biometrics-are-better-
than-no-security-at-all/#1e8840404bc2
- ProgrammableWeb : FBI Apple Debacle Is a Reminder of How Fingerprint Sensors
Actually Worsen Security
http://www.programmableweb.com/news/fbi-apple-debacle-reminder-how-fingerprint-
sensors-actually-worsen-security/analysis/2016/04/04
- ValueWalk (1): iPhone Encryption – Bio-metrics More Vulnerable To Backdoor Than
Password
http://www.valuewalk.com/2016/03/iphone-encryption-biometric-backdoor/
- ValueWalk (2): How To Hack The Security Of Smartphones
http://www.valuewalk.com/2016/03/how-to-hack-the-security-of-smartphones/?all=1
- CloudTweaks: WHAT TECHNOLOGY CAN DISPLACE THE PASSWORD?
http://cloudtweaks.com/2016/03/technology-displace-password/#wpautbox_latest-post
- HackRead(1): FBI identifies WhatsApp as next target while court case with Apple
goes on
https://www.hackread.com/fbi-identifies-whatsapp-as-next-target/
- HackRead (2): Backdoor on Your Smartphone Already Exists — Explained
https://www.hackread.com/backdoor-on-smartphones-already-exists/
- Top Tech News: Peril of Backdoor on Smartphones -- Blind Spot in Our Mind &
False Sense of Security
http://www.toptechnews.com/article/index.php?story_id=1300029WZHNC
- CIO Today: Peril of Backdoor on Smartphones: Blind Spots in Our Mind
http://www.cio-today.com/article/index.php?story_id=0110006XJ2BO
- Point of Sales: How Biometrics Can Weaken Security On A Device
http://pointofsale.com/2016040510437/Point-of-Sale-News/How-Biometrics-Can-
Weaken-Security-On-A-Device.html
26th May, 2016/
Hitoshi Kokumai

More Related Content

Viewers also liked

Help unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHelp unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHitoshi Kokumai
 
biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
黏性传播(高级定制版)
黏性传播(高级定制版)黏性传播(高级定制版)
黏性传播(高级定制版)lisimo
 
How to Conduct a Brand Audit 080715
How to Conduct a Brand Audit   080715How to Conduct a Brand Audit   080715
How to Conduct a Brand Audit 080715Judy Hopelain
 
スタディツアー事業化計画~新しい福利厚生の形~
スタディツアー事業化計画~新しい福利厚生の形~
スタディツアー事業化計画~新しい福利厚生の形~
スタディツアー事業化計画~新しい福利厚生の形~ stucon
 
Estado de minas 20 de julho de 2011 - capa chico lobo
Estado de minas   20 de julho de 2011 - capa chico loboEstado de minas   20 de julho de 2011 - capa chico lobo
Estado de minas 20 de julho de 2011 - capa chico loboRede Catitu
 
Elementos arquitectonicos en una obra
Elementos arquitectonicos en una obraElementos arquitectonicos en una obra
Elementos arquitectonicos en una obragene_29
 
International Volunteerism
International VolunteerismInternational Volunteerism
International VolunteerismAmanda Starbuck
 
Nuevas tecnologías de la información 8
Nuevas tecnologías de la información 8Nuevas tecnologías de la información 8
Nuevas tecnologías de la información 8Ivan Villamizar
 

Viewers also liked (11)

Blind authentication
Blind authenticationBlind authentication
Blind authentication
 
Help unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHelp unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guideline
 
biometric technology
biometric technologybiometric technology
biometric technology
 
黏性传播(高级定制版)
黏性传播(高级定制版)黏性传播(高级定制版)
黏性传播(高级定制版)
 
How to Conduct a Brand Audit 080715
How to Conduct a Brand Audit   080715How to Conduct a Brand Audit   080715
How to Conduct a Brand Audit 080715
 
Colaboración recíproca
Colaboración recíprocaColaboración recíproca
Colaboración recíproca
 
スタディツアー事業化計画~新しい福利厚生の形~
スタディツアー事業化計画~新しい福利厚生の形~
スタディツアー事業化計画~新しい福利厚生の形~
スタディツアー事業化計画~新しい福利厚生の形~
 
Estado de minas 20 de julho de 2011 - capa chico lobo
Estado de minas   20 de julho de 2011 - capa chico loboEstado de minas   20 de julho de 2011 - capa chico lobo
Estado de minas 20 de julho de 2011 - capa chico lobo
 
Elementos arquitectonicos en una obra
Elementos arquitectonicos en una obraElementos arquitectonicos en una obra
Elementos arquitectonicos en una obra
 
International Volunteerism
International VolunteerismInternational Volunteerism
International Volunteerism
 
Nuevas tecnologías de la información 8
Nuevas tecnologías de la información 8Nuevas tecnologías de la información 8
Nuevas tecnologías de la información 8
 

More from Hitoshi Kokumai

Image-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptxImage-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptxHitoshi Kokumai
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)Hitoshi Kokumai
 
Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)Hitoshi Kokumai
 
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Hitoshi Kokumai
 
Fend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic MemoryFend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic MemoryHitoshi Kokumai
 
Bring healthy second life to legacy password system
Bring healthy second life to legacy password systemBring healthy second life to legacy password system
Bring healthy second life to legacy password systemHitoshi Kokumai
 
Intriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to OneIntriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to OneHitoshi Kokumai
 
Cyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password SystemsCyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password SystemsHitoshi Kokumai
 
Updated: Presentation with Scripts at CIW2018
Updated:  Presentation with Scripts at CIW2018Updated:  Presentation with Scripts at CIW2018
Updated: Presentation with Scripts at CIW2018Hitoshi Kokumai
 
Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Hitoshi Kokumai
 
Updated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryUpdated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryHitoshi Kokumai
 
Deployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BDeployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BHitoshi Kokumai
 
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...Hitoshi Kokumai
 
Business Dimension of Expanded Password System
Business Dimension of Expanded Password SystemBusiness Dimension of Expanded Password System
Business Dimension of Expanded Password SystemHitoshi Kokumai
 
Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceHitoshi Kokumai
 

More from Hitoshi Kokumai (15)

Image-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptxImage-to-Code Converter 31July2023.pptx
Image-to-Code Converter 31July2023.pptx
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)
 
Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)Fend Off Cyberattack with Episodic Memory (24Feb2023)
Fend Off Cyberattack with Episodic Memory (24Feb2023)
 
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
 
Fend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic MemoryFend Off Cybercrime with Episodic Memory
Fend Off Cybercrime with Episodic Memory
 
Bring healthy second life to legacy password system
Bring healthy second life to legacy password systemBring healthy second life to legacy password system
Bring healthy second life to legacy password system
 
Intriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to OneIntriguing Evlolution from One to Two and Back to One
Intriguing Evlolution from One to Two and Back to One
 
Cyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password SystemsCyber Predicament by Text-Only Password Systems
Cyber Predicament by Text-Only Password Systems
 
Updated: Presentation with Scripts at CIW2018
Updated:  Presentation with Scripts at CIW2018Updated:  Presentation with Scripts at CIW2018
Updated: Presentation with Scripts at CIW2018
 
Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018
 
Updated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryUpdated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and Memory
 
Deployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BDeployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63B
 
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
 
Business Dimension of Expanded Password System
Business Dimension of Expanded Password SystemBusiness Dimension of Expanded Password System
Business Dimension of Expanded Password System
 
Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity Assurance
 

Recently uploaded

(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 

Recently uploaded (20)

(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 

Misuse in Cyberspace of Biometrics Discussed on Media

  • 1. - Misuse in Cyberspace of Biometrics Discussed on Media - Elsevier's "Biometric Technology Today" has published an article of mine titled "Biometrics: great technology for physical security, probably big mistake for cyber security?" in the May/2016 issue as announced at http://www.sciencedirect.com/science/article/pii/S0969476516300881 The conclusion of the article is “In summary, based on this analysis, in most cases authentication by biometrics provides poorer security than pincode or password-only authentication. And given that a false sense of security is often worse than the lack of security, I would like to put forward these suggestions: the vendors of smart devices who are conscious of the privacy and security of consumers could tell consumers not to turn on the biometric functions; consumers who are concerned about their privacy and security could refrain from activating the biometric backdoors; and the deployment of biometric solutions could instead be recommended where consumers can accept ‘below- one’ factor authentication in return for better convenience.” ------------------------------------------------------- Similar articles of the same tenor have been published or taken up by - Payments Journal: Misuse of Biometrics Technology http://www.paymentsjournal.com/Content/Blogs/Industry_Blog/30986/ - Information Security Buzz: Misuse of Biometrics – Blind Spot in Our Mind and False Sense of Security http://www.informationsecuritybuzz.com/articles/misuse-biometrics-blind-spot-mind- false-sense-security/ - SC Magazine UK (1): False sense of security spreading on a gigantic scale http://www.scmagazineuk.com/false-sense-of-security-spreading-on-a-gigantic- scale/article/478372/#disqus_thread - SC Magazine UK (2): Biometrics deployed with a fallback password: statistics on false sense of security http://www.scmagazineuk.com/biometrics-deployed-with-a-fallback-password-statistics- on-false-sense-of-security/article/485434/ - Forbes: Even Poor Biometrics Are Better than No Security At All http://www.forbes.com/sites/tonybradley/2016/03/21/even-poor-biometrics-are-better- than-no-security-at-all/#1e8840404bc2 - ProgrammableWeb : FBI Apple Debacle Is a Reminder of How Fingerprint Sensors Actually Worsen Security http://www.programmableweb.com/news/fbi-apple-debacle-reminder-how-fingerprint- sensors-actually-worsen-security/analysis/2016/04/04
  • 2. - ValueWalk (1): iPhone Encryption – Bio-metrics More Vulnerable To Backdoor Than Password http://www.valuewalk.com/2016/03/iphone-encryption-biometric-backdoor/ - ValueWalk (2): How To Hack The Security Of Smartphones http://www.valuewalk.com/2016/03/how-to-hack-the-security-of-smartphones/?all=1 - CloudTweaks: WHAT TECHNOLOGY CAN DISPLACE THE PASSWORD? http://cloudtweaks.com/2016/03/technology-displace-password/#wpautbox_latest-post - HackRead(1): FBI identifies WhatsApp as next target while court case with Apple goes on https://www.hackread.com/fbi-identifies-whatsapp-as-next-target/ - HackRead (2): Backdoor on Your Smartphone Already Exists — Explained https://www.hackread.com/backdoor-on-smartphones-already-exists/ - Top Tech News: Peril of Backdoor on Smartphones -- Blind Spot in Our Mind & False Sense of Security http://www.toptechnews.com/article/index.php?story_id=1300029WZHNC - CIO Today: Peril of Backdoor on Smartphones: Blind Spots in Our Mind http://www.cio-today.com/article/index.php?story_id=0110006XJ2BO - Point of Sales: How Biometrics Can Weaken Security On A Device http://pointofsale.com/2016040510437/Point-of-Sale-News/How-Biometrics-Can- Weaken-Security-On-A-Device.html 26th May, 2016/ Hitoshi Kokumai