Identity theft using selfies: Your fingerprint can now be stolen from your
pictures <http://www.naturalnews.com/author/paulm>*
<http://www.naturalnews.com/tag/biometric-authentication>
<http://www.naturalnews.com/tag/fingerprints>
<http://www.naturalnews.com/tag/selfies>*
are
<https://www.addtoany.com/share#url=http%3A%2F%2Fwww.naturalnews.com%2F2017-01-18-identity-theft-using-selfies-your-fingerprint-can-be-stolen-from-your-pictures.html&title=Identity%20theft%20using%20selfies%3A%20Your%20fingerprint%20can%20now%20be%20stolen%20from%20your%20pictures%20%E2%80%93%20NaturalNews.com>
Delicious <http://www.naturalnews.com/#delicious>mail
<http://www.naturalnews.com/#email>

[image: Image: Identity theft using selfies: Your fingerprint can now be
stolen from your pictures]
I*f you like to display the peace sign when **posing for pictures*
<https://technology.inquirer.net/57626/peace-sign-in-selfies-could-lead-to-fingerprint-retrieval-identity-theft>*
or
selfies, there’s a new strategy you should employ, effective immediately.
Make sure the back, or fingernail side of your hand is displayed, and not
the fingerprint side. If you are featured in any online photos where you
are exposing your fingerprint, you might want to consider deleting those as
soon as possible. Photos that are shared and stored online create an active
database of fingerprints for thieves to exploit.*

*Advancements in photo manipulation software can now lead to identity
theft; because it is now possible for identity thieves to successfully
obtain your fingerprint data from images. Japanese professor, Isao Echizen,
knows the dangers of exposing your fingerprints first hand. Echizen is
advising people to reconsider the innocent peace sign pose, after a recent
experiment was conducted by his team at the NII’s Digital Content and Media
Sciences Research Division, where they were able to successfully retrieve
peoples fingerprint data from photos that were taken from distances up to
three meters away. “Fingerprint data can be re-created if fingerprints are
in focus with strong lighting in a picture,” said Echizen.*

*The technique Echizen describes doesn’t use any special software, but
certainly requires good lighting. Low light pictures aren’t a significant
threat now, but could become more serious in the future as mobile cameras
become more sophisticated. Whenever possible, it is important not to rely
on security measures that require fingerprint data
<http://www.cultofmac.com/461983/fingerprints-from-selfies/>.*

*Biometrics are becoming an increasingly accepted form of reliable
security, replacing passwords and other safeguarding solutions in many
instances. Keeping your prints private <http://www.cyberattack.news/> is
now a valid concern. You can always change your password after being
hacked, but you can’t change your fingerprints.*

*Professor Echizen believes that celebrities are most vulnerable
<https://www.healthrangerstore.com/products/rfid-blocking-wallet?variant=16536070977>
to
the new method of identity theft; due to the high number of photographs
they generally appear in. While regular individuals might downplay the
threat, this is a real situation which has already caused everyday people
to become victims of ransom scams, because they compromised the security of
their digital data.*

*An ordinary photo is all it takes for a thief to gain the ability to copy
your fingerprint. The progression of technology in high quality digital
photos has opened one side of the vulnerability, the other side being
technologies akin to Touch ID, which turn your fingerprints into digital
keys that can be used to unlock many of the devices we use today.*

*A third vulnerability exists within the technologies that use our
fingerprints for verification or validation. Touch ID and similar
fingerprint verifying security measures are likely to store your
fingerprint data so that it can be compared to the print that is trying to
gain access through the security measure. The fact that your fingerprint
data could be stored up in a cloud for comparison raises additional
security concerns
<https://www.healthrangerstore.com/products/emergency-multifunctional-shovel-with-tools?variant=16535980417>,
because hackers might be able to obtain that data in a security breech
similar to what we often see with major companies.*

*In Echizen’s home country of Japan, as in many parts of the world, the
peace sign is a common gesture shown in photos, however, it isn’t the sole
hand gesture that could compromise your security. Other common gestures
like waving, or giving a thumbs up, also create the same security
vulnerability. When a fingerprint is matched with a person’s face, it
creates a significantly greater threat for identity thieves to use
the biometric data
<http://www.digitaltrends.com/mobile/peace-sign-selfie-fingerprint-identity-theft-news/>
with
malicious intent.*

*The fingerprint sensor on your phone is the key to unlocking all the
private information that is stored on the device. This is not the first
warning advising people that their fingerprint data needs to be protected.
Back in 2014, a hacker demonstrated an eerily similar technique where he
successfully replicated a German politician’s fingerprints from a public
photo. The hacker then proceeded to create a three-dimensional mold of the
fingerprint, which was capable of unlocking a secured phone. (RELATED:
Learn more about technology glitches and failures at Glitch.news
<http://glitch.news/>)*

*Sources:*

Technology.Inquirer.net
<https://technology.inquirer.net/57626/peace-sign-in-selfies-could-lead-to-fingerprint-retrieval-identity-theft>

CultofMac.com <http://www.cultofmac.com/461983/fingerprints-from-selfies/>

DigitalTrends.com
<http://www.digitaltrends.com/mobile/peace-sign-selfie-fingerprint-identity-theft-news/>




​Circulated by,
K.Raman.​

-- 
You received this message because you are subscribed to the Google Groups 
"Thatha_Patty" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to thatha_patty+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to