iSD in the Tech Age!



Net-self-defense, we spend an exorbitant amount of time on our physical defense training and then we forget that our lives are in just as much danger of "Grave Financial Harm" or Financial ruin (Death) as if we are attacked by a street predator. Research and studies show, from the security experts in this field, that Anti-virus and Firewall suites only catch about 5% of the threats out there and those same folks tell us that it is in all probability worse at the Enterprise levels.


My goal here is to educate myself, and by proxy, pass on what I learn to others so that each individual who is connected at any level can take steps to achieve some semblance of security in their electronic on-line lives. We are so deeply imbedded in modern technology that to not take appropriate actions to learn iSD or internet self-defense in the technological age is just foolishness.


My goal is to provide enough of a foundation that readers, like me, can take the appropriate actions, i.e., apply those fundamental principles of technological methodologies to safeguard one of the more important, actually critical, strategies and tactics to defend ourselves from grave economical harm or even economical/financial death or ruin from nefarious predatory hacking processes.


Nothing in this blog is definitive, it is meant to set a foundation of knowledge, understanding and awareness so that you are not one day blindsided by some effort to steal your very life out from underneath you so fast you feel like you have been hit behind the ear and knocked into a daze of confusion, fear and finally anger where your tech-life falls apart and ruins your real life utterly, completely and with no light in sight down that dark, empty and black hole.


Tuesday, March 8, 2016

Touch ID: Fingerprints

Blog Article/Post Caveat (Read First Please: Click the Link)

The cell phones now allow you easy access, faster access, by encoding your fingerprints in their, “Touch ID” systems. With the inherent security flaws of cell phones that is tantamount to giving your fingerprints to the data brokers at minimum while also providing them to the criminal elements in the cyber-world. All it takes is one app that is free while it installs things like malware and key loggers, etc. but this time it takes the code that actually recognizes your fingerprint. 

Fingerprints are the mainstay of criminal investigations of the legal communities and I can imagine the uses this would provide the criminal elements of the iVerse. Guess what, there is a huge push to have all access through security measures to use fingerprint ID software. It is one of those selling points that your fingerprint being such a unique feature of the human body, literally no two alike, that it means superior security but the weak link here is how they create the software to first extract your fingerprint, store it electronically and then use it with recognition software to gain a pass through what ever security you are using where ever you are using it. Well, all that software is built on code, i.e., the one’s and zero’s of computer code and code itself is flawed and full of holes that can bypass this so-called fingerprint security measures.

Think about that and when you use this one single sign-on security process you are depending not on the fingerprint but the code that runs it all. It isn’t about fingerprints, it is about the code. Code comes from humans and humans are fallible to the extreme because that is what makes us human and makes us vulnerable - to the extreme. 

Bibliography (Click the link)



1 comment:

  1. The Touch ID Hack

    The hack that won a huge monetary prize was not as code specific as I thought. It led me to add in that if you decide to use the TouchID for security on your phone or other computer devices you had better get into the habit of wiping the surface after each use in case you lose the phone.

    Then again, with this hack published to every single cyber-criminal in the world you would have to wipe each and every surface you touch at ever location and in every situation where your bare fingers make contact with most surfaces.

    If you become paranoid enough and if you have not contributed your fingerprints to TouchID or any other fingerprint oriented security device you may be ok and if not, you can always wear gloves every single moment of both waking and sleeping time.

    Ain’t life a hoot and it goes to show that no matter how good security developments are there is always some human out there that can create a work-around to bypass said security model.

    Oh, and no, I am not going to provide the hack process here because I don’t want to promote that hack so if you want to find it, go find it yourself cause I ain’t going to make it easier for you than I have too.

    ReplyDelete