As i understand, no security scheme is unbreakable. So go for the one thats the hardest to break. In the use-case i was mentioning, ie, making finger print identification for voters in India, i dont think its economically viable for the attacker to go chopping off peope's fingers just to cast a vote. As you mentioned, i guess in this case the storage of the identity mechanisms is the weekest link, not the biometric identification device(fingerprint, retinal scan etc) itself.
2 comments:
I remember an earlier blog post where you'd wanted biometric indentification.
Security guru Schneier has come up with a post that might interest you - Security risks of biometrics that might interest you.
Cheers,
Sudhir.P
I had read that, and was about to post an update.
As i understand, no security scheme is unbreakable. So go for the one thats the hardest to break. In the use-case i was mentioning, ie, making finger print identification for voters in India, i dont think its economically viable for the attacker to go chopping off peope's fingers just to cast a vote. As you mentioned, i guess in this case the storage of the identity mechanisms is the weekest link, not the biometric identification device(fingerprint, retinal scan etc) itself.
Post a Comment