The library near me has a 3d printer that anyone can use.
This renders all fingerprint scanners vulnerable and I don't even have to pay a cent!
Tell me which company has a disclaimer on their website that it's not secure.
Also, Samsung never said Facial Recognition was secure -- setting it up actually warns you that it isn't.
The warning is somewhat overblown and it's actually safer than fingerprints. Fingers prints you leave everywhere, especially on the surface of the phone. As a malicious attacker, I have everything I need just by stealing the phone.
Iris scanner? Requires a good picture with a decent camera. If they don't take a good picture, they're screwed as you're gone.
Airtight? Maybe not, and should be correected. However, other companies seem to get a free pass for their marketing.../div>
This is wrong, and shows a basic misunderstanding about how encryption works (especially Public-Private key pairs).
What most OSes do when encrypting is that it generates a key. This key does not normally change and is transparent to the user. The password you use encrypts this key and only this key. This way, you can grant other users access to your files (and the system / root user) in a multiuser system without giving or remembering your password.
When you change a password, it simply decrypts the key, and re-encrpyts it. Only the new encrypted key is written to the hard drive - nothing else needs to be changed.
With your method, you need to write the old password/key down somewhere should the system be restarted during the rewrite -- this leaves a MASSIVE security issue as a full drive rewrite of 100s of GB will take at least 30-60 minutes./div>
Techdirt has not posted any stories submitted by Someone asdf.
Re: Re: Re: facial recognition flaws
This renders all fingerprint scanners vulnerable and I don't even have to pay a cent!
Tell me which company has a disclaimer on their website that it's not secure.
Also, Samsung never said Facial Recognition was secure -- setting it up actually warns you that it isn't.
The warning is somewhat overblown and it's actually safer than fingerprints. Fingers prints you leave everywhere, especially on the surface of the phone. As a malicious attacker, I have everything I need just by stealing the phone.
Iris scanner? Requires a good picture with a decent camera. If they don't take a good picture, they're screwed as you're gone.
Airtight? Maybe not, and should be correected. However, other companies seem to get a free pass for their marketing.../div>
Re: Re: Technical question about phone security
You better not have an idevice, as their lawyers literally say that their advertising is bullshit and you shouldn't believe anything they say.
Google "No reasonable person would believe our advertisements". It'll autocomplete with the full sentence about halfway typing that./div>
Re:
What most OSes do when encrypting is that it generates a key. This key does not normally change and is transparent to the user. The password you use encrypts this key and only this key. This way, you can grant other users access to your files (and the system / root user) in a multiuser system without giving or remembering your password.
When you change a password, it simply decrypts the key, and re-encrpyts it. Only the new encrypted key is written to the hard drive - nothing else needs to be changed.
With your method, you need to write the old password/key down somewhere should the system be restarted during the rewrite -- this leaves a MASSIVE security issue as a full drive rewrite of 100s of GB will take at least 30-60 minutes./div>
Techdirt has not posted any stories submitted by Someone asdf.
Submit a story now.
Tools & Services
TwitterFacebook
RSS
Podcast
Research & Reports
Company
About UsAdvertising Policies
Privacy
Contact
Help & FeedbackMedia Kit
Sponsor/Advertise
Submit a Story
More
Copia InstituteInsider Shop
Support Techdirt