Skip to main content

tv   Shift  Deutsche Welle  April 6, 2020 10:15am-10:30am CEST

10:15 am
for the government when it came to their response to the crisis you don't want to be good as they're reporting from london you're watching it on the news remember you can get the latest headlines on the on our website. dot com i'm british thanks for joining me in to report of ever. why subscribe to d.w. books you meet your favorite writer write. to what i write is to share what i find beautiful. on you to. virus spread. em and. just through the topics of the weekly radio
10:16 am
show is called spectrum if you would like the information on the krona laroche or any other science topic you should really check out our podcast so you can get it wherever you get your podcast you can also find us and. science. my fingerprint my face the way i move all of these can be turned into a unique biometrics and be used to identify me for example for making online payments but how secure is this technology really today on shift. when i wait at this bar a system registers my face and that's the bomb and know which customer is next in
10:17 am
line i've never found my face war useful i use my finger prick. to unlock my phone and to get access to this high security area a computer 1st needs to scan my body movements biometrics i increasingly replacing typical passwords and access keys for example. systems can recognize a person specific physical attributes their fingerprints facial features. the technology is already used around the world by the somali army doctors and for authenticating patients for important drugs or for online banking on smartphones. even systems that look under your skin such as infrared scanners that are used in vein matching oxygen. absorbs more in from. patterns can be matched. scientists are currently developing technology
10:18 am
that can recognize a person on the basis of their heartbeat. others are working on identifying. sounds like biometrics super practical. those endless lead character password combinations happy days or is there a cat's we talk to professor to find out it teaches internet technologies and systems at potsdam based research institute more secure up of a possible words or biometrics. i think i took is that we should be using your fingerprint to log in is obviously more convenient than you just put your finger on the reader those are identified and then you're in that's much easier than typing a password the last words are often we get halfway to pass they're a little out of date password protected systems are easy to implement that's
10:19 am
probably why they're so common. that. for years that's a cost issue mirrors and so on the most senses i can use to scan a fingerprint or face the more accurately i can capture someone's biometric profile for their. the security of this technology depends on how well it's implemented or if there are enough senses this is more secure than passwords to follow. finger up talk iris recognition fingerprint scans and facial recognition similar in the sense that the old check for a single constant biometric feature or and which the system recognizes me for a password by contrast is something i need to memorize i should write it down anywhere
10:20 am
because otherwise anyone who finds it can pretend to be me. to complete the future is a multi factor authentication or at least 2 factor authentication of code and i think that ultimately the most user friendly systems will be the ones used the most been exchanged. so biometric identification is convenient but is our personal data safe companies using this tech have to ensure that biometric data is securely stored and encrypted ideally end user devices and not if some clout just makes it harder for hackers to get to unfortunately that's not always done team of israeli researchers managed to hack into a 23 gigabyte database with over 27000000 records containing fingerprints facial profiles and much more but of course possible databases have also been compromised
10:21 am
beyond large scale attacks there's also a risk of individual systems and devices being cracked and i'm a bit worried about how successful hackers have been at odds with biometrics. password can be stolen someone can watch it enter it somewhere or find where you write it down or even just guess at this can't happen with biometric identification tag biometrics are convenient and save users from having to remember passwords. but unlike. passwords you can't change your biometric of data if it's been hacked. and under lab conditions hackers have managed to outsmart biometric encryption technologies. for instance they do get an i phone fingerprint scanner using a fingerprint lifted from a glass. and combining a picture of a person's iris with
10:22 am
a contact lens got them past a samsung phone iris scan or. hackers from germany's chaos computer club have developed a wax hand that fooled a palm vein scanner. and chinese hackers spoofed apple's face id live news detection technology with just a pair of glasses and some tape. we should stress all these hacks were carried out under lab conditions the quality of a system sensors largely determines how safe it is which means smartphones are easier to outwit than elaborate security systems. clearly biometrics aren't as safe as you might think even though a scenario like taking a fake wex hand along to break into a high security area isn't very realistic either still many tech companies keep rolling by a measure of security features the latest apple and google's models for example let you make payments using facial recognition tech pretty convenient but it's not
10:23 am
personal data safe with these companies and what if companies or states get too nosy. in great britain c.c.t.v. cameras are ubiquitous the average londoner is caught on camera 300 times every day but if facial recognition technology were applied to analyze that c.c.t.v. footage. surveillance cameras are widespread in britain and london has been called c.c.t.v. capital. people have even begun using them independently of the authorities. because you can go on facebook get people's profile images and easy upload software criminals etc in the place uploaded images all over the line you can pick up the. security system when the person crosses your cameras your system picks it up so it's not easy perhaps but it's also an invasion of privacy in britain many are
10:24 am
used to c.c.t.v. cameras but since authorities have started combining surveillance cameras with facial recognition tag some say this goes too far people like ed bridges from cardiff who recently made a shocking discovery the van was parked just around the corner and the by the time i was close enough to see facial recognition technology written on the phone it had already captured my data several times over and i felt like an invasion of my privacy i'm a law abiding member of the public i was going about my daily business i wasn't committing any crime i was no threat to anyone and yet the police were there filming me and capturing my data is actually. bridges took the welsh police to court and lost he's currently appealing that ruling but for now police continue to use their tactic scanning hundreds of faces per 2nd checking them against wanted list. we are looting we are developing and there are actually people being taken off the streets who are
10:25 am
wanted for offenses or to be the court direct result of the deployment of this technology. the question remains whether the really justify the means. if you ask me we should all be wary of handing out our biometric data i wonder if the convenience outweighs the potential risks researchers already working on so-called cancelable biometrics here the biometric data is encrypted before it stuart and not show this means that not my actual face is thought but a digitally altered version if anyone has the system i can delete my data and create a new biometric password that sounds pretty good and even more options like behavioral biometrics here smartphones and wearables analyze how we type or the way you walk for example. there's a software that captures how fast we walk the length of our steps and ahead movement and uses this data to create
10:26 am
a movement profile by which it authenticates the smartphone can communicate with a gate for example and unlock it when we approach. but if your movement doesn't match the profile the door will remain locked simple behavioral sequences such as how you get your smartphone out of your pocket can be enough to identify you. finding and tying this technology into everyday movements can be very convenient because you wouldn't have to do anything to authenticate yourself from. the software can tap into your smartphones and wearables sensors. then it calculates a trust level based on your behavior. this means it assesses the odds that it's really you using the device and not some stranger.
10:27 am
i confide. vietnam to join this behavioral system is that the other party does not actually need to save me. movement profile. because we feel this data is only registered by your smartphone that's where the trusted score is calculated and only the score is shared with the service provider passed at that. service provider you believe. this means your phone alone registers your movements no sensitive private data is saved on a cloud or shared with a service provider that makes this method particularly secure. put an end to the big problem we currently have leaked password files and leaked by metrical data cyber criminals are selling the state or online by using behavioral profiles this problem would disappear overnight behavioral security technology and multi factor authentication are very secure as a rule of thumb the more elaborate the security method and sensors the better but
10:28 am
so far hackers have always managed to create by a measurable security systems and allow conditions facial recognition fingerprint scanners palm then recognition nothing is 100 percent safe which doesn't mean we should be going back to passwords because these also get stolen plus many people think 2 factor authentication is a hassle and that's that we should think carefully about if we want to use by a measurable password at all and which companies we trust with this sensitive information what do you think are things like using a fingerprint for online banking a great idea or pretty reckless that is now here that's all from me by by.
10:29 am
what keeps us in shape what makes us sick and housing estate houses. my name is dr carson the i talk to me the case let's. watch them at work. and then discuss what you can do to improve your health. stay choose and let's all try to stay in good shape. mr. nicolle because in germany to learn german english cynical why not learn with him d.j. music you learn in course because vic. wants
10:30 am
the secret service classical. music to sound. for the story behind the music but his morning agents british. hot. beethoven's 9th symphony for the world starts people night on t.w. . welcome to in good shape is your host dr costin look. do you know the situation you had an argument with your best friend and then you get a headache or you messed up an exam and then you get a skin rash.

21 Views

info Stream Only

Uploaded by TV Archive on