Design Con 2015
Breaking News
News & Analysis

Voice & Face Unlock Smartphones & Tablets

6/30/2014 04:25 PM EDT
27 comments
NO RATINGS
More Related Links
View Comments: Newest First | Oldest First | Threaded View
<<   <   Page 2 / 3   >   >>
goafrit
User Rank
Manager
Re: Pretty Amazing
goafrit   7/1/2014 12:46:20 PM
NO RATINGS
>> And the higher security stuff that also requires voice identification -- and that works even in noisy environments -- is really rather clever. 

Hope it can decipher when there is threat and the voice changes. People seem to speak differently under threat than in normal times

Max The Magnificent
User Rank
Blogger
Re: How secure
Max The Magnificent   7/1/2014 12:25:00 PM
NO RATINGS
@LarryM99: The instructor for the hacking training that I took was teaching his 5-year-old daughter to pick locks.

I must admit that I'd love to know how to pick locks -- not that I have much call for it in my day-to-day life, you understand -- but I'm sure it would be a useful skill when the day of the Robot Apocalypse (or the Zombie Apocalypse) dawns.

LarryM99
User Rank
CEO
Re: How secure
LarryM99   7/1/2014 12:19:39 PM
NO RATINGS
The fascinating / scary thing about the hacker world is how the most complex security can be beaten by the simplest things. For example, here's a video of a $160 hardened bike lock being picked using a Bic pen (https://www.youtube.com/watch?v=LahDQ2ZQ3e0). The instructor for the hacking training that I took was teaching his 5-year-old daughter to pick locks. She was opening 5-tumbler locks at that point.

Computers (including smartphones and tablets) are complex beasts, which makes them all the more vulnerable.

Larry M.

Max The Magnificent
User Rank
Blogger
Re: How secure
Max The Magnificent   7/1/2014 11:51:05 AM
NO RATINGS
@LarryM99: Mythbusters did a show where they hacked fingerprint readers with a xeroxed copy of a print.

I remember a short science fiction story from long ago (Asimov perhaps?) about something like this -- someone (turns out to be a good guy showing how th esystem can be broken) kidnapping a rich person and using his fingerprint and iris scan to buy all sorts of goods.

LarryM99
User Rank
CEO
Re: How secure
LarryM99   7/1/2014 10:10:58 AM
NO RATINGS
@Max, say something like that at a hacker's conference and they will take it as a challenge. By the next morning you will have at least half a dozen videos of you saying passwords in your inbox.

This does sound like it is an improvement on early biometric systems, though. Mythbusters did a show where they hacked fingerprint readers with a xeroxed copy of a print.

Larry M.

Max The Magnificent
User Rank
Blogger
Re: How secure
Max The Magnificent   7/1/2014 9:55:41 AM
NO RATINGS
@Garcia: I got really scared when I heard how easy an "unbreakable" system can by bypassed by skilled hackers.

My mother-in-law bought us a box of unbreakable glasses as a gift.

We don't have any left...

Max The Magnificent
User Rank
Blogger
Re: Pretty Amazing
Max The Magnificent   7/1/2014 9:54:20 AM
NO RATINGS
@betajet: My mother says "all bearded men look alike", so way way way too many false matches.

I will ask the folks at Sensory hwo they would answer your mother's point.

Max The Magnificent
User Rank
Blogger
I forgot to mention
Max The Magnificent   7/1/2014 9:52:50 AM
NO RATINGS
I forgot to mention in this column that a simple photo of the person won't work -- the system is also looking for little muscle twitches and eye blinks and suchlike to know that it's looking as a living person.

Max The Magnificent
User Rank
Blogger
Re: How secure
Max The Magnificent   7/1/2014 9:51:14 AM
NO RATINGS
@LarryM99: A video of a user saying the password might just do the same here.

Well yes, maybe, but it's a lot harder to get a face-on video of a user saying a password without him/her noticing than is is to watch them type in a PIN.

Garcia-Lasheras
User Rank
Blogger
Re: How secure
Garcia-Lasheras   7/1/2014 8:32:07 AM
NO RATINGS
@Adam-Taylor: "security / cryptography is not broken / cracked but bypassed"

About 10 days ago I assisted to a conference and round-table hosted by Telefonica/Movistar (the biggest Spanish telecom provider) about enterprise-level security in information technologies and this was stated and exemplifed by most of the VIP attendants, including a world-class hacker, the boss of security systems at Telefonica and the Navarra Autonomous Police chief officer.

I got really scared when I heard how easy an "unbreakable" system can by bypassed by skilled hackers.

<<   <   Page 2 / 3   >   >>
Radio
LATEST ARCHIVED BROADCAST
EE Times Senior Technical Editor Martin Rowe will interview EMC engineer Kenneth Wyatt.
Top Comments of the Week
Like Us on Facebook

Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
EE Times on Twitter
EE Times Twitter Feed
Flash Poll