Fingerprints
From Just Solve the File Format Problem
(Difference between revisions)
Dan Tobias (Talk | contribs) (→Links) |
Dan Tobias (Talk | contribs) (→Links) |
||
Line 9: | Line 9: | ||
* [http://www.fbi.gov/about-us/cjis/fingerprints_biometrics/recording-legible-fingerprints/takingfps FBI fingerprint guide] | * [http://www.fbi.gov/about-us/cjis/fingerprints_biometrics/recording-legible-fingerprints/takingfps FBI fingerprint guide] | ||
* [http://xato.net/authentication/fingerprints-and-passwords/ Fingerprints and Passwords: A Guide for Non-Security Experts] | * [http://xato.net/authentication/fingerprints-and-passwords/ Fingerprints and Passwords: A Guide for Non-Security Experts] | ||
+ | * [http://boingboing.net/2013/09/12/why-fingerprints-make-lousy-au.html Why fingerprints make lousy authentication tokens] |
Revision as of 04:11, 13 September 2013
Fingerprints of humans are supposedly unique, and sometimes used to track down criminals or to authenticate access to systems.