Fingerprints
From Just Solve the File Format Problem
				
								
				(Difference between revisions)
				
																
				
				
								
				| Dan Tobias  (Talk | contribs)  (→Links) | Dan Tobias  (Talk | contribs)   (→Links) | ||
| Line 9: | Line 9: | ||
| * [http://www.fbi.gov/about-us/cjis/fingerprints_biometrics/recording-legible-fingerprints/takingfps FBI fingerprint guide] | * [http://www.fbi.gov/about-us/cjis/fingerprints_biometrics/recording-legible-fingerprints/takingfps FBI fingerprint guide] | ||
| * [http://xato.net/authentication/fingerprints-and-passwords/ Fingerprints and Passwords: A Guide for Non-Security Experts] | * [http://xato.net/authentication/fingerprints-and-passwords/ Fingerprints and Passwords: A Guide for Non-Security Experts] | ||
| + | * [http://boingboing.net/2013/09/12/why-fingerprints-make-lousy-au.html Why fingerprints make lousy authentication tokens] | ||
Revision as of 04:11, 13 September 2013
Fingerprints of humans are supposedly unique, and sometimes used to track down criminals or to authenticate access to systems.

