Menu
News
All News
Dungeons & Dragons
Level Up: Advanced 5th Edition
Pathfinder
Starfinder
Warhammer
2d20 System
Year Zero Engine
Industry News
Reviews
Dragon Reflections
White Dwarf Reflections
Columns
Weekly Digests
Weekly News Digest
Freebies, Sales & Bundles
RPG Print News
RPG Crowdfunding News
Game Content
ENterplanetary DimENsions
Mythological Figures
Opinion
Worlds of Design
Peregrine's Nest
RPG Evolution
Other Columns
From the Freelancing Frontline
Monster ENcyclopedia
WotC/TSR Alumni Look Back
4 Hours w/RSD (Ryan Dancey)
The Road to 3E (Jonathan Tweet)
Greenwood's Realms (Ed Greenwood)
Drawmij's TSR (Jim Ward)
Community
Forums & Topics
Forum List
Latest Posts
Forum list
*Dungeons & Dragons
Level Up: Advanced 5th Edition
D&D Older Editions, OSR, & D&D Variants
*TTRPGs General
*Pathfinder & Starfinder
EN Publishing
*Geek Talk & Media
Search forums
Chat/Discord
Resources
Wiki
Pages
Latest activity
Media
New media
New comments
Search media
Downloads
Latest reviews
Search resources
EN Publishing
Store
EN5ider
Adventures in ZEITGEIST
Awfully Cheerful Engine
What's OLD is NEW
Judge Dredd & The Worlds Of 2000AD
War of the Burning Sky
Level Up: Advanced 5E
Events & Releases
Upcoming Events
Private Events
Featured Events
Socials!
EN Publishing
Twitter
BlueSky
Facebook
Instagram
EN World
BlueSky
YouTube
Facebook
Twitter
Twitch
Podcast
Features
Top 5 RPGs Compiled Charts 2004-Present
Adventure Game Industry Market Research Summary (RPGs) V1.0
Ryan Dancey: Acquiring TSR
Q&A With Gary Gygax
D&D Rules FAQs
TSR, WotC, & Paizo: A Comparative History
D&D Pronunciation Guide
Million Dollar TTRPG Kickstarters
Tabletop RPG Podcast Hall of Fame
Eric Noah's Unofficial D&D 3rd Edition News
D&D in the Mainstream
D&D & RPG History
About Morrus
Log in
Register
What's new
Search
Search
Search titles only
By:
Forums & Topics
Forum List
Latest Posts
Forum list
*Dungeons & Dragons
Level Up: Advanced 5th Edition
D&D Older Editions, OSR, & D&D Variants
*TTRPGs General
*Pathfinder & Starfinder
EN Publishing
*Geek Talk & Media
Search forums
Chat/Discord
Menu
Log in
Register
Install the app
Install
Upgrade your account to a Community Supporter account and remove most of the site ads.
Community
General Tabletop Discussion
*Geek Talk & Media
iPhone 5S
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="Deset Gled" data-source="post: 6180530" data-attributes="member: 7808"><p>Well, if hackers steal one of your fingerprints, just use a different finger. <img src="https://cdn.jsdelivr.net/joypixels/assets/8.0/png/unicode/64/1f642.png" class="smilie smilie--emoji" loading="lazy" width="64" height="64" alt=":)" title="Smile :)" data-smilie="1"data-shortname=":)" /></p><p></p><p>You are generally correct, though. Biometrics are a poor method of security. What they are useful for is user identification. Like Janx mentioned, you could have the phone recognize the user and pull up their profile based on who pulls it up, like a user log in that doesn't require you to remember the user name. I used to work at a company that was implementing fingerprint identification for QA purposes (i.e. the system knows that Worker #23 built widget #294839). I ended up leaving that company before the implementation was successful, though.</p><p></p><p>The part that confuses me is the things that made fingerprinting useful there make it a pain in the butt for a phone. There are inevitably going to be times when it is *useful* to log in as someone else on a computer, and fingerprint access makes that hard. And the concept of user accounts is potentially useful on a shared computer, but phones tend to be single-user system. I really have no reason to set up a second user account for my wife. I suppose there may be times when it's useful for kids or emergency calls, but proper passwording and 911 access on home screens have already solved these problems.</p><p></p><p></p><p></p><p>Aside from wearing a bandage over a cut, this is less of an issue that you would think. A fingerprint scanner doesn't actually take a photo and compare direct images of your print to a previous image. At least, the one we used in manufacturing didn't. Instead, it processed the scan as a series of lines, and identified about 10 key locations: things like intersecting lines, centers of circles, etc. It then stored just the data for these points, and compared them to the same key points on any new scan. It could allow a couple of points to change (i.e. you have a small cut, one point is screwed up) and still pass the scan. Coloration or lighting wouldn't have any effect as long as there was sufficient contrast, and distortion of the image could be allowed as long as it was uniform in the right way (i.e. known smudging or scanning artifacts).</p><p></p><p>This method also removes the security risk of hackers (or the NSA) stealing your fingerprint for access elsewhere. Since the system didn't actually store an image of your fingerprint, there was no way to completely reconstruct it. A stolen data file could only be used to spoof your ID if it was used on an identical fingerprint ID system with identical settings.</p></blockquote><p></p>
[QUOTE="Deset Gled, post: 6180530, member: 7808"] Well, if hackers steal one of your fingerprints, just use a different finger. :) You are generally correct, though. Biometrics are a poor method of security. What they are useful for is user identification. Like Janx mentioned, you could have the phone recognize the user and pull up their profile based on who pulls it up, like a user log in that doesn't require you to remember the user name. I used to work at a company that was implementing fingerprint identification for QA purposes (i.e. the system knows that Worker #23 built widget #294839). I ended up leaving that company before the implementation was successful, though. The part that confuses me is the things that made fingerprinting useful there make it a pain in the butt for a phone. There are inevitably going to be times when it is *useful* to log in as someone else on a computer, and fingerprint access makes that hard. And the concept of user accounts is potentially useful on a shared computer, but phones tend to be single-user system. I really have no reason to set up a second user account for my wife. I suppose there may be times when it's useful for kids or emergency calls, but proper passwording and 911 access on home screens have already solved these problems. Aside from wearing a bandage over a cut, this is less of an issue that you would think. A fingerprint scanner doesn't actually take a photo and compare direct images of your print to a previous image. At least, the one we used in manufacturing didn't. Instead, it processed the scan as a series of lines, and identified about 10 key locations: things like intersecting lines, centers of circles, etc. It then stored just the data for these points, and compared them to the same key points on any new scan. It could allow a couple of points to change (i.e. you have a small cut, one point is screwed up) and still pass the scan. Coloration or lighting wouldn't have any effect as long as there was sufficient contrast, and distortion of the image could be allowed as long as it was uniform in the right way (i.e. known smudging or scanning artifacts). This method also removes the security risk of hackers (or the NSA) stealing your fingerprint for access elsewhere. Since the system didn't actually store an image of your fingerprint, there was no way to completely reconstruct it. A stolen data file could only be used to spoof your ID if it was used on an identical fingerprint ID system with identical settings. [/QUOTE]
Insert quotes…
Verification
Post reply
Community
General Tabletop Discussion
*Geek Talk & Media
iPhone 5S
Top