Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. When your password leaks:→ Change your password→ Problem solved

When your password leaks:→ Change your password→ Problem solved

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
biometricsprivacydiscord
68 Indlæg 51 Posters 46 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • celeste_42bit@infosec.exchangeC celeste_42bit@infosec.exchange

    @ill_logic @jfml @capitainesam every proper implementation hashes the fingerprint, just like you don't store clear text passwords in the shadow file...

    The question is, is this a proper implementation on phones...

    jfml@mastodon.artJ This user is from outside of this forum
    jfml@mastodon.artJ This user is from outside of this forum
    jfml@mastodon.art
    wrote sidst redigeret af
    #59

    @celeste_42bit @ill_logic @capitainesam But does this (hashing of the fingerprint) help with the problem that if it get leaked I can basically never use it again? Using your fingerprint is like having a password you can't change does the hashing change anything about this?

    ill_logic@mastodon.socialI 1 Reply Last reply
    0
    • jfml@mastodon.artJ jfml@mastodon.art

      @celeste_42bit @ill_logic @capitainesam But does this (hashing of the fingerprint) help with the problem that if it get leaked I can basically never use it again? Using your fingerprint is like having a password you can't change does the hashing change anything about this?

      ill_logic@mastodon.socialI This user is from outside of this forum
      ill_logic@mastodon.socialI This user is from outside of this forum
      ill_logic@mastodon.social
      wrote sidst redigeret af
      #60

      @jfml @celeste_42bit @capitainesam If I somehow get your fingerprint, I can figure out the hash. But if I steal the hash I *can't figure out your fingerprint. Hashes are cool like that. So in principle you should still be able to use it.

      * Now the caveat is that it has to be done right. And perhaps someone can find a way to break these systems over time. This has happened with password database systems. Also I don't know anything about biometrics in particular, just the principles at play here.

      ill_logic@mastodon.socialI jfml@mastodon.artJ 2 Replies Last reply
      0
      • ill_logic@mastodon.socialI ill_logic@mastodon.social

        @jfml @celeste_42bit @capitainesam If I somehow get your fingerprint, I can figure out the hash. But if I steal the hash I *can't figure out your fingerprint. Hashes are cool like that. So in principle you should still be able to use it.

        * Now the caveat is that it has to be done right. And perhaps someone can find a way to break these systems over time. This has happened with password database systems. Also I don't know anything about biometrics in particular, just the principles at play here.

        ill_logic@mastodon.socialI This user is from outside of this forum
        ill_logic@mastodon.socialI This user is from outside of this forum
        ill_logic@mastodon.social
        wrote sidst redigeret af
        #61

        @jfml @celeste_42bit @capitainesam (BTW I don't use biometric logins)

        1 Reply Last reply
        0
        • ill_logic@mastodon.socialI ill_logic@mastodon.social

          @jfml @celeste_42bit @capitainesam If I somehow get your fingerprint, I can figure out the hash. But if I steal the hash I *can't figure out your fingerprint. Hashes are cool like that. So in principle you should still be able to use it.

          * Now the caveat is that it has to be done right. And perhaps someone can find a way to break these systems over time. This has happened with password database systems. Also I don't know anything about biometrics in particular, just the principles at play here.

          jfml@mastodon.artJ This user is from outside of this forum
          jfml@mastodon.artJ This user is from outside of this forum
          jfml@mastodon.art
          wrote sidst redigeret af
          #62

          @ill_logic @celeste_42bit @capitainesam Ah, ok, thanks for the explanation, that makes sense.

          celeste_42bit@infosec.exchangeC 1 Reply Last reply
          0
          • jfml@mastodon.artJ jfml@mastodon.art

            @ill_logic @celeste_42bit @capitainesam Ah, ok, thanks for the explanation, that makes sense.

            celeste_42bit@infosec.exchangeC This user is from outside of this forum
            celeste_42bit@infosec.exchangeC This user is from outside of this forum
            celeste_42bit@infosec.exchange
            wrote sidst redigeret af
            #63

            @jfml @ill_logic @capitainesam Yea, Hashes are designed to loose data by design.

            You can, for example, hash a 1000 page book, and the 265bit hash will still only have 265bits. It's unique for the book, but due to the obvious massive data loss, the book is not recoverable from the hash.

            But same here, I have very little understanding of how biometric locks actually work. Just the absolute basics.

            1 Reply Last reply
            0
            • charlesdelavalleepoussin@mastodon.socialC charlesdelavalleepoussin@mastodon.social

              @capitainesam

              Won't the law require you to to biometric ID?

              zuthal@floofy.techZ This user is from outside of this forum
              zuthal@floofy.techZ This user is from outside of this forum
              zuthal@floofy.tech
              wrote sidst redigeret af
              #64

              @charlesdelavalleepoussin @capitainesam If it's a paid service that might count as automatically verifying any user as being an adult if it only allows payment methods that aren't accessible to minors

              1 Reply Last reply
              0
              • capitainesam@mastodon.socialC capitainesam@mastodon.social

                When your password leaks:
                → Change your password
                → Problem solved

                When your biometric data leaks:
                → You can't change your face
                → You can't change your fingerprints
                → The compromise is permanent
                → Your biometric data is in breach databases forever

                This is why facial recognition for age verification is dangerous.

                #Biometrics #Privacy #Discord

                jlperuyero@masto.nobigtech.esJ This user is from outside of this forum
                jlperuyero@masto.nobigtech.esJ This user is from outside of this forum
                jlperuyero@masto.nobigtech.es
                wrote sidst redigeret af
                #65

                @capitainesam
                Interesting point of view.
                Department of Witness Protection for leaked biometrics?

                1 Reply Last reply
                0
                • capitainesam@mastodon.socialC capitainesam@mastodon.social

                  When your password leaks:
                  → Change your password
                  → Problem solved

                  When your biometric data leaks:
                  → You can't change your face
                  → You can't change your fingerprints
                  → The compromise is permanent
                  → Your biometric data is in breach databases forever

                  This is why facial recognition for age verification is dangerous.

                  #Biometrics #Privacy #Discord

                  fundamental@social.treehouse.systemsF This user is from outside of this forum
                  fundamental@social.treehouse.systemsF This user is from outside of this forum
                  fundamental@social.treehouse.systems
                  wrote sidst redigeret af
                  #66

                  @capitainesam Fun bit of trivia for fingerprints is that there are known approaches of using fingerprints to generate pub/private style keypairs, so you can use that biometric in a safer manner (in theory). In practice your point absolutely stands.

                  1 Reply Last reply
                  0
                  • capitainesam@mastodon.socialC capitainesam@mastodon.social

                    When your password leaks:
                    → Change your password
                    → Problem solved

                    When your biometric data leaks:
                    → You can't change your face
                    → You can't change your fingerprints
                    → The compromise is permanent
                    → Your biometric data is in breach databases forever

                    This is why facial recognition for age verification is dangerous.

                    #Biometrics #Privacy #Discord

                    patterfloof@meow.socialP This user is from outside of this forum
                    patterfloof@meow.socialP This user is from outside of this forum
                    patterfloof@meow.social
                    wrote sidst redigeret af
                    #67

                    @capitainesam IF we could trust that a 1-way transform of the data is stored rather than your raw fingerprints & a jpeg of your face/passport, things would be slightly better

                    unfortunately, biometric ID is being pushed by untrusted parties

                    1 Reply Last reply
                    0
                    • mercutio@troet.cafeM mercutio@troet.cafe

                      @dancingtreefrog
                      Why copy? Just get the finger. With or without the human hanging on it.

                      @capitainesam

                      chloeraccoon@mastodonapp.ukC This user is from outside of this forum
                      chloeraccoon@mastodonapp.ukC This user is from outside of this forum
                      chloeraccoon@mastodonapp.uk
                      wrote sidst redigeret af
                      #68

                      @Mercutio @dancingtreefrog @capitainesam @patterfloof
                      In my head now:

                      KRYTEN: Logically, sir, there is only one way you could have possibly
                      have opened that door. I feel quite nauseous. Where is it?
                      LISTER: Where's what?
                      KRYTEN: Oh, sir!! You've got it in your jacket!!
                      LISTER: I got us out of the hold, didn't I?
                      KRYTEN: Sir, you are sick! You are a sick, sick person! How can you
                      possibly even conceive of such an idea?

                      1 Reply Last reply
                      0
                      • jwcph@helvede.netJ jwcph@helvede.net shared this topic
                      Svar
                      • Svar som emne
                      Login for at svare
                      • Ældste til nyeste
                      • Nyeste til ældste
                      • Most Votes


                      • Log ind

                      • Har du ikke en konto? Tilmeld

                      • Login or register to search.
                      Powered by NodeBB Contributors
                      Graciously hosted by data.coop
                      • First post
                        Last post
                      0
                      • Hjem
                      • Seneste
                      • Etiketter
                      • Populære
                      • Verden
                      • Bruger
                      • Grupper