<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Strong (er) Authentication ? Interested in your thoughts. in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/4256#M438</link>
    <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/735870607"&gt;@lukos&lt;/a&gt;&amp;nbsp;Some&amp;nbsp;valid points and I broadly agree with your&amp;nbsp;thrust, some I think are perhaps not so valid, or&amp;nbsp;at least apply more generally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll put some stream of &amp;nbsp;thoughts down in answer to your points here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. What's stored is how the biometric credential 'looks' to the particle sensor(s), protocols and algorithms that sample the data. So if it's very a limited&amp;nbsp;model of your retina&amp;nbsp;that's stolen(spooky) then perhaps that model can be refined. Or move on to another set of samples. Biometric re-keys are going to be hard.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To the 'how can we trust...x, to do y?' thats done all the time, always imperfectly and it comes dow to risk, impact and threat. You've to trust someone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. You'd probably be surprised(or maybe you wouldn't) as to how many biometrics and behavioral analytics are used are used on us - selfie to make a payment, use a casino face geometry etc. GDPR is going to have some impact here in profiling.&amp;nbsp;I think if society decides to use them to orwellian&amp;nbsp;levels we're not going to&amp;nbsp;to run out.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. Your heart and gait are pretty consistent across their operation(tibia is x long, left ventricle has Y capacity, arteries have a similar week to week amount furiness) unless you injure yourself, have a pacemaker, get really old etc. These can be supported and rekeyed and if we really want super strong identity biometrics would learn over a timeline.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;4. This point applies to any computer system, so I'm inclined to discount this one. To ensure there is not a weakness is very expensive and imperfect, but if you want to formally verify all systems with mathematical proof then fine, but we can't afford it for almost everything we build.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;5. I don't know the fear is so much natural for&amp;nbsp;biometrics, or is a defined phobia,&amp;nbsp;From Mashable&amp;nbsp;&amp;nbsp;&lt;A href="http://mashable.com/2014/08/02/tech-phobias/#oMOZrCTnZsqV" target="_self"&gt;http://mashable.com/2014/08/02/tech-phobias/#oMOZrCTnZsqV&lt;/A&gt;&amp;nbsp;fear of selfies would be the closes It's a cherry pick from the internet I know, but I think fear of tech,&amp;nbsp;&amp;nbsp;fear &amp;nbsp;of the powerful entity rather than the technology are more pertinent. Invasive vs passive etc are good ways to look at making these technologies acceptable. Its a tool like any other, your smartphone&amp;nbsp;could spy on you in very private moments it's still by the side of most people's beds. I f you travel a lot you got over that feat pretty quickly or you don't get on planes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To the last point; which government? How would we guarantee that they do? If 'the goverment' is the problem then maybe they should be&amp;nbsp;a Jon Postel(&lt;A href="https://tools.ietf.org/html/rfc2468" target="_self"&gt;https://tools.ietf.org/html/rfc2468&lt;/A&gt;)&amp;nbsp;of Identity&amp;nbsp;to establish the&amp;nbsp;global trust. Maybe no one company should make a decision?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6. Complex factor authentication and authorization &amp;nbsp;would not rely on biometric techniques solely, psychometrics, knowledge based, keys on the system, timelines etc could all be used. But if you want to identify a person they are probably the best way of getting to ground truth.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Most of the claims/assertion based systems deal with what you need to hold for a level of knowing, and balanced legislation in required to balance rights and responsibilities. If peoples money keeps getting stolen, there postal photos are leaked and attackers take over their accounts and computers I'd expect more calls for better authentication - if&amp;nbsp;attacks stop less. I don't think that there is a perfect balance, but if you need to know who someone really is then short modding humans with their own&amp;nbsp;HSMs people I don't think we have a better suite of technologies. FIDO makes a good set of compromises, use what available and the, serve provider needs to decide what the bar is on assurance.&lt;/P&gt;</description>
    <pubDate>Wed, 13 Dec 2017 03:51:43 GMT</pubDate>
    <dc:creator>Early_Adopter</dc:creator>
    <dc:date>2017-12-13T03:51:43Z</dc:date>
    <item>
      <title>Strong (er) Authentication ? Interested in your thoughts.</title>
      <link>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/3602#M356</link>
      <description>&lt;P&gt;As an (ISC)2 board member, but more importantly as an executive for a large bank, I'm very interested in our community's thoughts on how to solve the authentication problem.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What worries me specifically are the sensationalized stories emerging about biometric authentication being defeated.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.theregister.co.uk/2017/11/13/iphone_x_face_id/?utm_source=dlvr.it&amp;amp;utm_medium=facebook" target="_blank"&gt;https://www.theregister.co.uk/2017/11/13/iphone_x_face_id/?utm_source=dlvr.it&amp;amp;utm_medium=facebook&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.dailymail.co.uk/sciencetech/article-4522062/Brothers-trick-HSBC-voice-recognition-software.html" target="_blank"&gt;http://www.dailymail.co.uk/sciencetech/article-4522062/Brothers-trick-HSBC-voice-recognition-software.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;My concern is that these articles tell only part of the story. In reality, most if not all "authenticators" can be defeated. The question as always, in my opinion, should be: "Is the control commensurate with the risk?" I would think that biometric face recognition is a far sight more effective than passwords (as an example) for a lot of reaso&lt;/SPAN&gt;&lt;SPAN&gt;ns - even if it can be fooled. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I think these stories can actually be dangerous because they scare people away from using incrementally better controls. And so because of stories, like the ones above, many will opt out of the stronger biometric control in favor of using an easily guessed or phished password etc... Nothing is perfect, but some controls are less imperfect than others and we need to keep this in mind. How do we educate people toward making pragmatic and informed decisions on how to keep themselves safe??&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I'm interested in your perpsectives.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Greg T.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Toronto, Canada&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2017 23:25:22 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/3602#M356</guid>
      <dc:creator>gthompson</dc:creator>
      <dc:date>2017-11-14T23:25:22Z</dc:date>
    </item>
    <item>
      <title>Re: Strong (er) Authentication ? Interested in your thoughts.</title>
      <link>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/3628#M357</link>
      <description>&lt;P&gt;I agree. Articles can scare people off with misrepresentations and omission of key facts, but that is how they sell papers, or these articles. We have to proclaim the virtues of these features of better security and not perfect security. As security practitioners we have to sell the idea that no solution is perfect, but as long as we keep improving security we can keep improving and making it harder for the bad actors. We must keep the idea that it is all about improving from where we are not waiting to act until we have a perfect solution.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2017 16:25:21 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/3628#M357</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2017-11-15T16:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: Strong (er) Authentication ? Interested in your thoughts.</title>
      <link>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/3707#M366</link>
      <description>&lt;P&gt;Yes, the negatives are being sensationalized.&amp;nbsp; That is to be expected as that is what gets eyes on the content.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Having said that, I tend to pay more attention to the articles exposing the weaknesses in new technologies.&amp;nbsp; When the technology works the way it is supposed to, everything is hunky dory.&amp;nbsp; I want to know the ways it can fail or be misused.&amp;nbsp; I do not need to defend against when things are used the way they are supposed to be (malicious tech aside), but I do need to defend against when it breaks, is miss used, or abused.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In this case, passwords and their vulnerabilities are well understood.&amp;nbsp; Biometrics, far less so.&amp;nbsp; When a password is suspected of being compromised, it can easily be changed.&amp;nbsp; If a biometric is compromised how do you change it short of&amp;nbsp;changing &amp;nbsp;the underlying technology?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Nov 2017 17:53:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/3707#M366</guid>
      <dc:creator>jeffl</dc:creator>
      <dc:date>2017-11-16T17:53:25Z</dc:date>
    </item>
    <item>
      <title>Re: Strong (er) Authentication ? Interested in your thoughts.</title>
      <link>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/3735#M369</link>
      <description>&lt;P&gt;Any second factor has to be better than password alone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The defense industry is obliged to use 2-factor authentication.&amp;nbsp; I have experience of running a system where users had either a hardware token, on a key ring, or an app on their phones which gave a code.&amp;nbsp; Worked pretty well, and not many users complained but maybe they knew that the customer was insisting on it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is hard to impose a system!&amp;nbsp; If biometrics work they are ideal, but I have the feeling we are not there yet.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Nov 2017 16:17:40 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/3735#M369</guid>
      <dc:creator>swissjon</dc:creator>
      <dc:date>2017-11-17T16:17:40Z</dc:date>
    </item>
    <item>
      <title>Re: Strong (er) Authentication ? Interested in your thoughts.</title>
      <link>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/3736#M370</link>
      <description>&lt;P&gt;To the last point we could just all get new retinas... thoughts as follows.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All controls and technologies are possible to defeat/work around and will get defeated in the press and in real life, especially if the problem space sets rewards for the attackers doing so. Not always using the same methods/being predictable I think is important long term.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see biometric auth(and maybe all auth) as a bit like climbing a rock-face, three points of contact is going to be the best option as far as safety is concerned.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So if you did facial recognition from a camera, voice print from a mic, gait analysis over time from&amp;nbsp;an accelerometer, fingerprint from a reader and monitoring of heart rate(I think Apple have patented this), you'd have five biometrics and you could select three.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Going out on a limb in nature,&amp;nbsp;look at antivirals in medicine three points of attack across different channels really does help dealing with&amp;nbsp;diseases that mutate allot.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To&amp;nbsp;go even further to the world of biology we could say, don't deploy&amp;nbsp;your best anti-bacterial drugs needlessly to avoid resistance being built up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Stepping out of anaology:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Try to use&amp;nbsp;biometric's in combination supported with other biometrics; also don't use them frivolously, and don't be predictable;&lt;/LI&gt;&lt;LI&gt;Once you are registered with a biometric use other factors things on devices like keys, TPMs, location awareness etc to make sure that only defeating&amp;nbsp;biometrics does not grant access;&lt;/LI&gt;&lt;LI&gt;Secrets such as passwords and passphrase are still somewhat useful in combination, and would always serve to increase attackers work rate - but even more than this perhaps new technologies open up more options for new types of&amp;nbsp;secrets - I for would be quite chuffed if I could do a bee inspired&amp;nbsp;waggle dance form my Kinect to make a bill payment( - not for everyone I know and the novelty would wear off - but might even get a Kinect if there was such an option).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I think that long term we'll be talking about 'complex factor authentication' rather than multi-factor auth and we will probably even look at continual authentication for some&amp;nbsp;use cases, things so sensitive that if the system(s) that verify lose track of you in their blockchain timeline record, you might have to convince you are you all over again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tritely paraphrasing, but I believe it if we invest enough it will hold true :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;'You can fool some of the authenticators all of the time, and all of the authenticators some of the time. But you can't fool all of the authenticators all of the time.'&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Nov 2017 16:44:26 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/3736#M370</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2017-11-17T16:44:26Z</dc:date>
    </item>
    <item>
      <title>Re: Strong (er) Authentication ? Interested in your thoughts.</title>
      <link>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/3857#M372</link>
      <description>&lt;P&gt;A lot of biometric techniques depend heavily on machine learning in some of the spoofed attacks likeness has been used to break the authentication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In applying machine learning its not the image or the finger print that is authenticated but extracted features of the object. What may make these stories more shocking is if the features used in the ML algorithms could be replicated from objects which bears no resemblance to the object being authenticated. A mistake that a human or password validation wouldn't make!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think a lot of the testing for these algorithms focuses on authentication of examples of me and not me. Some interesting research may to explore mimicking of the features used in the algorithm and not the image itself, I think we might be surprised at what is actually authenticated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Long passwords may not be that bad and may be more predictable&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Thu, 23 Nov 2017 21:14:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/3857#M372</guid>
      <dc:creator>Robert</dc:creator>
      <dc:date>2017-11-23T21:14:52Z</dc:date>
    </item>
    <item>
      <title>Re: Strong (er) Authentication ? Interested in your thoughts.</title>
      <link>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/3859#M373</link>
      <description>&lt;P&gt;Excellent&amp;nbsp;point Robert.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Nov 2017 03:43:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/3859#M373</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2017-11-24T03:43:44Z</dc:date>
    </item>
    <item>
      <title>Re: Strong (er) Authentication ? Interested in your thoughts.</title>
      <link>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/4247#M435</link>
      <description>&lt;P&gt;There are a number of problems with biometrics, most of them mentioned in separate answers already:&lt;/P&gt;&lt;P&gt;1) Resetting biometrics is largely not possible. If at any point, your biometric data is stolen, what are you supposed to do both as the customer and as the company? How can we ever trust someone who has to store biometric data?&lt;/P&gt;&lt;P&gt;2) Biometrics are not available to all people which restricts their effectiveness for the general public. Not everyone has fingerprints.&lt;/P&gt;&lt;P&gt;3) Biometrics are not always repeatable. What happens to my gait or heart rhythms if I am trying to authenticate after a run. What happens to facial recognition if I have some kind of injury&lt;/P&gt;&lt;P&gt;4) Biometrics are not just fooled at the physical level, you can inject data into anywhere in the software stack. How can you ensure that there is not a weakness between e.g. the retina scanner and the authentication app itself?&lt;/P&gt;&lt;P&gt;5) There is a natural fear of biometrics from the public. This might get better over time but there have been enough abuses by governments of our data that makes people justifiably concerned about the storage and misuse of this data. Scope creep has happened many times. Once a company has my biometric data, we can guarantee that the government do.&lt;/P&gt;&lt;P&gt;6) Biometrics have been shown to be cracked without even needing to be in the same room as the person you are impersonating (i.e. information from photos, from items that we carelessly discard without thought covered in fingerprints etc.) To crack a hardware generated number or a password (assuming the password is strong) is both better known and also generally harder when done remotely.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The bottom line is that they are apples and pears and hard to compare. You shouldn't be unduly worried by sensationalist media but you shouldn't also discard it as scaremongering or the concerns of the uninitiated. The deeper question is around identity itself and how far you need to identify someone. Do you really need to know that the person is John Smith from 100 Station Road, who grew up in Canada etc. or do you just need to know that this person is the same person who opened the account, that they have the right to open an account and don't have other accounts already for example? Unless you know how specific an identity you need from someone, it is very hard to decide on the correct choice of authentication.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2017 11:49:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/4247#M435</guid>
      <dc:creator>lukos</dc:creator>
      <dc:date>2017-12-12T11:49:48Z</dc:date>
    </item>
    <item>
      <title>Re: Strong (er) Authentication ? Interested in your thoughts.</title>
      <link>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/4256#M438</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/735870607"&gt;@lukos&lt;/a&gt;&amp;nbsp;Some&amp;nbsp;valid points and I broadly agree with your&amp;nbsp;thrust, some I think are perhaps not so valid, or&amp;nbsp;at least apply more generally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll put some stream of &amp;nbsp;thoughts down in answer to your points here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. What's stored is how the biometric credential 'looks' to the particle sensor(s), protocols and algorithms that sample the data. So if it's very a limited&amp;nbsp;model of your retina&amp;nbsp;that's stolen(spooky) then perhaps that model can be refined. Or move on to another set of samples. Biometric re-keys are going to be hard.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To the 'how can we trust...x, to do y?' thats done all the time, always imperfectly and it comes dow to risk, impact and threat. You've to trust someone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. You'd probably be surprised(or maybe you wouldn't) as to how many biometrics and behavioral analytics are used are used on us - selfie to make a payment, use a casino face geometry etc. GDPR is going to have some impact here in profiling.&amp;nbsp;I think if society decides to use them to orwellian&amp;nbsp;levels we're not going to&amp;nbsp;to run out.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. Your heart and gait are pretty consistent across their operation(tibia is x long, left ventricle has Y capacity, arteries have a similar week to week amount furiness) unless you injure yourself, have a pacemaker, get really old etc. These can be supported and rekeyed and if we really want super strong identity biometrics would learn over a timeline.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;4. This point applies to any computer system, so I'm inclined to discount this one. To ensure there is not a weakness is very expensive and imperfect, but if you want to formally verify all systems with mathematical proof then fine, but we can't afford it for almost everything we build.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;5. I don't know the fear is so much natural for&amp;nbsp;biometrics, or is a defined phobia,&amp;nbsp;From Mashable&amp;nbsp;&amp;nbsp;&lt;A href="http://mashable.com/2014/08/02/tech-phobias/#oMOZrCTnZsqV" target="_self"&gt;http://mashable.com/2014/08/02/tech-phobias/#oMOZrCTnZsqV&lt;/A&gt;&amp;nbsp;fear of selfies would be the closes It's a cherry pick from the internet I know, but I think fear of tech,&amp;nbsp;&amp;nbsp;fear &amp;nbsp;of the powerful entity rather than the technology are more pertinent. Invasive vs passive etc are good ways to look at making these technologies acceptable. Its a tool like any other, your smartphone&amp;nbsp;could spy on you in very private moments it's still by the side of most people's beds. I f you travel a lot you got over that feat pretty quickly or you don't get on planes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To the last point; which government? How would we guarantee that they do? If 'the goverment' is the problem then maybe they should be&amp;nbsp;a Jon Postel(&lt;A href="https://tools.ietf.org/html/rfc2468" target="_self"&gt;https://tools.ietf.org/html/rfc2468&lt;/A&gt;)&amp;nbsp;of Identity&amp;nbsp;to establish the&amp;nbsp;global trust. Maybe no one company should make a decision?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6. Complex factor authentication and authorization &amp;nbsp;would not rely on biometric techniques solely, psychometrics, knowledge based, keys on the system, timelines etc could all be used. But if you want to identify a person they are probably the best way of getting to ground truth.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Most of the claims/assertion based systems deal with what you need to hold for a level of knowing, and balanced legislation in required to balance rights and responsibilities. If peoples money keeps getting stolen, there postal photos are leaked and attackers take over their accounts and computers I'd expect more calls for better authentication - if&amp;nbsp;attacks stop less. I don't think that there is a perfect balance, but if you need to know who someone really is then short modding humans with their own&amp;nbsp;HSMs people I don't think we have a better suite of technologies. FIDO makes a good set of compromises, use what available and the, serve provider needs to decide what the bar is on assurance.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Dec 2017 03:51:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/4256#M438</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2017-12-13T03:51:43Z</dc:date>
    </item>
    <item>
      <title>Re: Strong (er) Authentication ? Interested in your thoughts.</title>
      <link>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/4264#M440</link>
      <description>&lt;P&gt;Terrible habit to reply to yourself, but this is pertinent and probably means that Apple have joined Microsoft and Google in doubling down on facial recognition on the device with Face ID:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://arstechnica.com/gadgets/2017/12/apple-invests-390m-in-finisar-maker-of-tech-used-in-truedepth-cameras/" target="_self"&gt;https://arstechnica.com/gadgets/2017/12/apple-invests-390m-in-finisar-maker-of-tech-used-in-truedepth-cameras/&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Dec 2017 19:27:38 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/4264#M440</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2017-12-13T19:27:38Z</dc:date>
    </item>
    <item>
      <title>Re: Strong (er) Authentication ? Interested in your thoughts.</title>
      <link>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/4278#M441</link>
      <description>&lt;P&gt;No, not a bad habit at all, replying to yourself. Sometimes you have a stroke of brilliance hit you after you hit Post! I know it happens to me, LOL!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is interesting about all of this movement to facial recognition software is what happens to anonymous login potential? Can you imagine if you had to log into your device with your face and your internet postings could be verified? I know a lot of people that would be in trouble, but think about how much calmness it would add to the internet. It would have the potential to slow down or potentially stop cyber bullying as the main reason people cyberbully is because of the anonymity of the internet. Keyboard warriors can launch virtual attacks because there is no retribution. No linking (at least not in real time) of people to their posts. If there is a linking then they just claim that someone hacked them. With facial recognition they would have a harder time claiming it wasn't them. I know facial recognition can also be hacked, but just wondering out loud...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let the privacy counter attack begin......&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2017 12:02:12 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/4278#M441</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2017-12-14T12:02:12Z</dc:date>
    </item>
    <item>
      <title>Re: Strong (er) Authentication ? Interested in your thoughts.</title>
      <link>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/4280#M442</link>
      <description>&lt;P&gt;Ah, it was a timely story that broke.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the feeling of observation - Charles Stross wrote a very intriguing&amp;nbsp;essay on the 'Panopticon Singularity' after the Snowden breath and while it is a hymn to privacy(and no worse for it) it raises very interesting and relevant points. TL;DR-&amp;nbsp;It goes back to the idea that the Victorians had that being watched, or thought that you were being watched was morally improving.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A&amp;nbsp;lot of problems with biometrics come down to sampling and flat&amp;nbsp;images of fingerprints, faces etc. about ten years ago someone asked me to find a solution that&amp;nbsp;could continuously authenticate someone based on typing - turned out timing fro flight time and dwell time on keys could do this, but only for passwords and there was a training&amp;nbsp;time, now I think it's fair to say decent learner/enough compute you could.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the old facial recognition is like a 2D&amp;nbsp;fotofit seen over TV for five seconds, the new approach of 3D mapping(with LazorS! maybe even crainial mounted on sharks) has the potential to be more like a satellite scanning and astroid - much more sampling options so much more power, and some of the challenges with more simple biometrics go away/become &amp;nbsp;less of a concern. Attackers will still adapt, but use factors in combination and select them unpredictably to reduce resitance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On privacy, yeah it's very important, but rights are balanced with responsibilities.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If we take the device vendors as three examples I kind of trust Apple to not sell me because they overcharge me anyway for shiny under specced things, Google I'm pretty sure will sell me so I don't use Android at all but I'm not so committed to my privacy that I will tolerate poor search results. Microsoft would sell me I think if it knew how, but I've come to expect them to not get the product right at first, so I figure I have time till they monetize linked in, and they can't do phones or tablets(we all know it's still a laptop).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now if your device knows who you are and then the website/service you post on needs to &lt;EM&gt;Authentorize&lt;/EM&gt;&lt;STRONG&gt;Me&lt;/STRONG&gt;TM, maybe because of the reach/policy then it could ask your device vendor if you could be worked back to if there was a complaint and then let you. Or maybe today is your yearly hate speech day, and the service detects you and then gets your ID because of this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now geopolitically, from society&amp;nbsp;standpoint can you get even to agree? No&amp;nbsp;way, and probably should for most activity but you can limit peoples ability to post to prime services without these kinds of controls around attribution, and that might be a good thing in balance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2017 12:38:26 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/4280#M442</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2017-12-14T12:38:26Z</dc:date>
    </item>
    <item>
      <title>Re: Strong (er) Authentication ? Interested in your thoughts.</title>
      <link>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/4281#M443</link>
      <description>&lt;P&gt;Another thing with facial recognition is this:&lt;/P&gt;&lt;P&gt;How is the computer storing your facial "hash"? Does it convert it down to a "number" (i.e. a hash)? If so, wouldn't it be that you just had to eventually find out what "number" equated to the hash of the user in order to hack them? After all, computers only know two things, 1's and 0's..........&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2017 12:44:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/4281#M443</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2017-12-14T12:44:01Z</dc:date>
    </item>
    <item>
      <title>Re: Strong (er) Authentication ? Interested in your thoughts.</title>
      <link>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/4283#M444</link>
      <description>&lt;P&gt;So trust but verify - but this is pretty&amp;nbsp;clear - not really for authentication alone but it's the same thing really:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://en.wikipedia.org/wiki/Facial_recognition_system" target="_self"&gt;https://en.wikipedia.org/wiki/Facial_recognition_system&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;'Popular recognition algorithms include &lt;A title="Principal component analysis" href="https://en.wikipedia.org/wiki/Principal_component_analysis" target="_blank"&gt;principal component analysis&lt;/A&gt; using &lt;A title="Eigenface" href="https://en.wikipedia.org/wiki/Eigenface" target="_blank"&gt;eigenfaces&lt;/A&gt;, &lt;A title="Linear discriminant analysis" href="https://en.wikipedia.org/wiki/Linear_discriminant_analysis" target="_blank"&gt;linear discriminant analysis&lt;/A&gt;, &lt;A title="Elastic matching" href="https://en.wikipedia.org/wiki/Elastic_matching" target="_blank"&gt;elastic bunch graph matching&lt;/A&gt; using the Fisherface algorithm, the &lt;A title="Hidden Markov model" href="https://en.wikipedia.org/wiki/Hidden_Markov_model" target="_blank"&gt;hidden Markov model&lt;/A&gt;, the &lt;A title="Multilinear subspace learning" href="https://en.wikipedia.org/wiki/Multilinear_subspace_learning" target="_blank"&gt;multilinear subspace learning&lt;/A&gt; using &lt;A title="Tensor" href="https://en.wikipedia.org/wiki/Tensor" target="_blank"&gt;tensor&lt;/A&gt;&amp;nbsp;representation, and the neuronal motivated &lt;A title="Dynamic link matching" href="https://en.wikipedia.org/wiki/Dynamic_link_matching" target="_blank"&gt;dynamic link matching&lt;/A&gt;.'&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;As we see the&amp;nbsp;learner is as important as the sensor.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The way I think about it(which is definitely and imperfect model) is in&amp;nbsp;the 3D method used by apple the 'hash' is like a map of data points that after the system learns your face, it tries to get to a good confidence level that it's seeing your face. The more points it stores the more accurate it an be but the longer to learn, and the longer to verify. If your surface doesn't recognize you wiggle your head around slightly and it might let you in when it 'feels' comfortable.&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;BR /&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2017 14:16:51 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/4283#M444</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2017-12-14T14:16:51Z</dc:date>
    </item>
    <item>
      <title>Re: Strong (er) Authentication ? Interested in your thoughts.</title>
      <link>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/4284#M445</link>
      <description>&lt;P&gt;That might make it tough if you went out the night before and partied too hard! I wonder how well it does baggy, bloodshot eyes and a 5'o'clock shadow?&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2017 14:45:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/4284#M445</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2017-12-14T14:45:02Z</dc:date>
    </item>
    <item>
      <title>Re: Strong (er) Authentication ? Interested in your thoughts.</title>
      <link>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/4305#M446</link>
      <description>&lt;P&gt;As long as you consistently look like that then OK, especially if every weekend you &amp;nbsp;do the same thing, your face would change &amp;nbsp;it would be great if ISC2 could ask Nasa to have astronauts test devices on the ground and after reaching orbit. &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But nothing stops you combining these techniques maybe your blood vessels are still the same in IR, or face geometry or still the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You could combine with other factors, do you have your phone, was it unlocked, is your iWatchTM sending your HR and does it seems right? Gesture to expressions could be used easily as well.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2017 18:57:26 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Strong-er-Authentication-Interested-in-your-thoughts/m-p/4305#M446</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2017-12-14T18:57:26Z</dc:date>
    </item>
  </channel>
</rss>

