tag:blogger.com,1999:blog-6850103531860448581.post3010452906904427217..comments2024-01-31T09:09:55.123-08:00Comments on Lubor On Tech: Can We Solve the Security Dilemma?Lubor Ptacekhttp://www.blogger.com/profile/08543751955416339809noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-6850103531860448581.post-38385000571753755172013-02-12T04:13:53.146-08:002013-02-12T04:13:53.146-08:00That's great these bio metrics not only provid...That's great these bio metrics not only provide the convenience of use but also provide the security by not entering of anyone inside the office.Google and Microsoft Offices have these kind of technology bio metric that can maintain your <a href="http://www.advancesystemsinc.com/solutions/time-and-attendance/" rel="nofollow">Instant Attendance Tracking</a> as well as time plus security even.Anonymoushttps://www.blogger.com/profile/07212277313501916259noreply@blogger.comtag:blogger.com,1999:blog-6850103531860448581.post-69897224292722429402012-12-17T18:24:00.522-08:002012-12-17T18:24:00.522-08:00Thank you for your comment, Greg. You are bringing...Thank you for your comment, Greg. You are bringing up an important point. The central point of potential vulnerability indeed. I agree with you that latex fingerprints are more interesting for science fiction movies. In the real life, the hackers would probably target the central server or the sensor/scanner which is likely less protected. Either way, nothing is foolproof!Lubor Ptacekhttps://www.blogger.com/profile/08543751955416339809noreply@blogger.comtag:blogger.com,1999:blog-6850103531860448581.post-7233010319756986102012-12-17T08:21:07.923-08:002012-12-17T08:21:07.923-08:00One of the other risks with the security options, ...One of the other risks with the security options, such as biometrics, is not just that the user has say a latex layer on his finger with someone else's blood in a la "Gattaca", but that the main server - or the network between the server and the device - is compromised and a real record is tampered with.<br /><br />This would result in the system believe that you are not you, or that someone else's print, iris scan etc is you. Given the recent hacks of places like RSA, Sony etc your "identity" could easily be amended/deleted etc at the source system as easily as it could at the device or transport layer.Greg Griffithshttp://www.greggriffiths.orgnoreply@blogger.com