<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Are biometrics safe? in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Are-biometrics-secure/m-p/59463#M795</link>
    <description>&lt;P&gt;Equating biometrics with other authenticators does not work well due to wildly different characteristics. In addition to being permanent, they also are continuously disclosed, difficult to lose/forget, and difficult to clone (presuming one is&amp;nbsp;&lt;A href="https://dolly.roslin.ed.ac.uk/facts/the-life-of-dolly/index.html" target="_blank" rel="noopener"&gt;not a sheep&lt;/A&gt; &lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt;).&amp;nbsp; I view biometrics more as "another tool in the toolbox", not as part of a "chose one" set.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unlocking a logged-in device that one has in their physical possession is one of the few good use-cases I see. The reason being that I can use the "convenience" of FaceID as a trade-off to gain acceptance of a security goal, short (1-minute) idle locks.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Coupled with that though is biometrics are insufficient when the situation becomes suspicious.&amp;nbsp; For example, a PIN is required after an iPhone reboot, and one must reauthenticate to add a new camera on a Windows.&amp;nbsp; And as failed in the original article, when rate-limiting has been exceeded.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 25 May 2023 15:14:58 GMT</pubDate>
    <dc:creator>denbesten</dc:creator>
    <dc:date>2023-05-25T15:14:58Z</dc:date>
    <item>
      <title>Are biometrics secure?</title>
      <link>https://community.isc2.org/t5/Threats/Are-biometrics-secure/m-p/59443#M792</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apparently not, Chinese researchers say they successfully bypassed fingerprint authentication safeguards on smartphones by staging a brute force attack.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://techxplore.com/news/2023-05-brute-force-bypasses-android-biometric-defense.html" target="_blank" rel="noopener"&gt;https://techxplore.com/news/2023-05-brute-force-bypasses-android-biometric-defense.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 10:33:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Are-biometrics-secure/m-p/59443#M792</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T10:33:08Z</dc:date>
    </item>
    <item>
      <title>Re: Are biometrics safe?</title>
      <link>https://community.isc2.org/t5/Threats/Are-biometrics-secure/m-p/59448#M793</link>
      <description>&lt;P&gt;The fundamental issue described in the article is not the use of biometrics, but rather that the adversary was able to subvert rate-limiting/locking.&amp;nbsp;&amp;nbsp;Keep in mind the traditional fallback for a phone unlock -- a 4-to-6-digit PIN.&amp;nbsp; That takes under 1M attempts to brute force, which makes rate limiting/locking critical.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Safe is a continuum, not a binary value.&amp;nbsp; I personally view biometrics as "safe enough" only when combined with other requirements, including rate-limiting/locking and a&amp;nbsp;physical presence requirement (e.g. to unlock phone that is in my hands, but not to unlock a VM with a remote-USB attached fingerprint reader).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 May 2023 01:08:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Are-biometrics-secure/m-p/59448#M793</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2023-05-25T01:08:07Z</dc:date>
    </item>
    <item>
      <title>Re: Are biometrics safe?</title>
      <link>https://community.isc2.org/t5/Threats/Are-biometrics-secure/m-p/59449#M794</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;I agree, with other measures, but you cannot change Iris's, eyes, fingerprints, or faces, unless you want to willingly undergo surgical procedures at cost.&amp;nbsp;&amp;nbsp; However, within the next ten years there will be a whole host of different cybernetics augmentations, for the human body to overcome losses or deficiencies, so perhaps one can change eyes, facial features and fingerprints.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But some organisations, can facilitate this if you are willing at a cost.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Thu, 25 May 2023 06:23:56 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Are-biometrics-secure/m-p/59449#M794</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-05-25T06:23:56Z</dc:date>
    </item>
    <item>
      <title>Re: Are biometrics safe?</title>
      <link>https://community.isc2.org/t5/Threats/Are-biometrics-secure/m-p/59463#M795</link>
      <description>&lt;P&gt;Equating biometrics with other authenticators does not work well due to wildly different characteristics. In addition to being permanent, they also are continuously disclosed, difficult to lose/forget, and difficult to clone (presuming one is&amp;nbsp;&lt;A href="https://dolly.roslin.ed.ac.uk/facts/the-life-of-dolly/index.html" target="_blank" rel="noopener"&gt;not a sheep&lt;/A&gt; &lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt;).&amp;nbsp; I view biometrics more as "another tool in the toolbox", not as part of a "chose one" set.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unlocking a logged-in device that one has in their physical possession is one of the few good use-cases I see. The reason being that I can use the "convenience" of FaceID as a trade-off to gain acceptance of a security goal, short (1-minute) idle locks.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Coupled with that though is biometrics are insufficient when the situation becomes suspicious.&amp;nbsp; For example, a PIN is required after an iPhone reboot, and one must reauthenticate to add a new camera on a Windows.&amp;nbsp; And as failed in the original article, when rate-limiting has been exceeded.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 May 2023 15:14:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Are-biometrics-secure/m-p/59463#M795</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2023-05-25T15:14:58Z</dc:date>
    </item>
    <item>
      <title>Re: Are biometrics safe?</title>
      <link>https://community.isc2.org/t5/Threats/Are-biometrics-secure/m-p/59475#M797</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;All good commonsense, although this appears to be a rarity these days!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately, some governments see this as a means of advertising digital identity initiatives and grand standing, whilst others use such techniques for mass surveillance purposes.&amp;nbsp; The public definitely needs to be kept informed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Thu, 25 May 2023 21:26:27 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Are-biometrics-secure/m-p/59475#M797</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-05-25T21:26:27Z</dc:date>
    </item>
  </channel>
</rss>

