Even Weaker than Very Weak
I have, by chance, found this 8-month-old report, which is never stale and absolutely intriguing.
This kind of reports tell us very powerfully that biometrics is not so secure and helpful as the pro-biometrics folks claim it to be.
However, actually, there is more to it in our world. That is, biometrics destroys the security that a password/pincode authentication has somehow provided so far, as analysed in this 2-minute video — Biometrics in Cyber Space — “below-one” factor authentication https://lnkd.in/eeci-Y7
Where a very weak password/pincode is registered as a default login means, biometrics added as a backdoor would provide a further weakened user authentication as the result of enlarged attack surface, say, even weaker than very weak.
And, alas, many of the users stay trapped in a false sense of security while security-savvy criminals quietly chuckling to themselves. Should your curiosity get turned on, please refer to “Step-by-Step Analysis of Why and How Biometrics Brings Down Security”
Key References
Biometrics is to Password what Back door is to Front door
Removal of Passwords and Its Security Effect
Negative Security Effect of Biometrics Deployed in Cyberspace
External Body Features Viewed as ‘What We Are’
Additional References
For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)
What We Know for Certain about Authentication Factors
Digital Identity for Global Citizens
Image-to-Code Conversion by Expanded Password System
Summary and Brief History — Expanded Password System
Proposition on How to Build Sustainable Digital Identity Platform
Account Recovery with Expanded Password System
History, Current Status and Future Scenarios of Expanded Password System
Update: Questions and Answers — Expanded Password System and Related Issues
< Videos on YouTube>
Slide: Outline of Expanded Password System (3minutes 2seconds)
Digital Identity for Global Citizens (10minutes — narrated)
Demo: Simplified Operation on Smartphone for consumers (1m41s)
Demo: High-Security Operation on PC for managers (4m28s)
Demo: Simple capture and registration of pictures by users (1m26s)
Slide: Biometrics in Cyber Space — “below-one” factor authentication