Fingerprints
From Just Solve the File Format Problem
(Difference between revisions)
Dan Tobias (Talk | contribs) |
Dan Tobias (Talk | contribs) (→Links) |
||
Line 16: | Line 16: | ||
* [http://xato.net/authentication/fingerprints-and-passwords/ Fingerprints and Passwords: A Guide for Non-Security Experts] | * [http://xato.net/authentication/fingerprints-and-passwords/ Fingerprints and Passwords: A Guide for Non-Security Experts] | ||
* [http://boingboing.net/2013/09/12/why-fingerprints-make-lousy-au.html Why fingerprints make lousy authentication tokens] | * [http://boingboing.net/2013/09/12/why-fingerprints-make-lousy-au.html Why fingerprints make lousy authentication tokens] | ||
+ | * [http://boingboing.net/2013/09/22/chaos-computer-club-claims-it.html Chaos Computer Club clones fingerprints to unlock iPhone] |
Revision as of 22:10, 22 September 2013
Fingerprints of humans are supposedly unique, and sometimes used to track down criminals or to authenticate access to systems.
Toeprints have similar sorts of patterns, but are less-used since shoes and socks usually get in the way of their being left in accessible places.
See also
- WSQ (FBI fingerprint format)