Hello Rohyt,

Last few articles on biometrics I've read claim they all can be
fooled, as much as up to 70% of the time, some just needed hot air
blown onto them, others worked with gummy bear lollies, somehow I
doubt I'd want to fork out a lot of money on something so dodgy ;)

what's worst is the false hit ratio, something like 70,000 people a
year going through an airport the size of LAX, would be falsely
matched as bad guys...

-- 
Best regards,
 evilbunny                            mailto:[EMAIL PROTECTED]

http://www.SydneyWireless.com - Exercise your communications
freedom to make it do what you never thought possible... 

Tuesday, September 10, 2002, 11:43:37 PM, you wrote:

RB> Evilbunny,
RB> I think the EAP allows for any authentication means, which could also be
RB> biometrics (might be going too far)!
RB> Correct me if I am wrong.

RB> - Rohyt 

RB> -----Original Message-----
RB> From: evilbunny [mailto:[EMAIL PROTECTED]] 
RB> Sent: Monday, September 09, 2002 10:40 PM
RB> To: [EMAIL PROTECTED]
RB> Subject: Re: [nycwireless] Wireless Security

RB> Hello Rohyt,

RB> And this is 1 of the reasons SSL was introduced into the current
RB> mapping database, as PTP are planning to use it as an alternative
RB> method of authentication for Nocat, rather then having usernames and
RB> passwords being sniffed... 

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to