Don’t be fooled by the ads saying biometric identifications are foolproof, that criminals cannot compromise them because it has been proven that you can compromise them, big time.
There are a variety of clever ways it can be done both tech-wise and sneaker-wise (using sneaker much like the old sneaker-mail meme, i.e., a non-tech method of copying and using your biometrics to circumvent security protocols for nefarious purposes.
Hey, I wear hearing aids that use bluetooth to connect to iPhone apps to control how the function and guess what, bluetooth has poor security protocols and anyone with the appropriate software can turn on your bluetooth in the aids and hear everything you hear, talk about eavesdropping, yikes!
I won’t tell you how they bypass your own fingerprints, retina prints or other biometric venues used for security but remember, the moment you add the biometric function to any security model it is hackable.
This brings me to how you can protect your biometrics, don’t allow them to be used in tech-security. But guess what, that won’t do the trick because, if they want you they will get you so the best security is to reduce the biometric recordings to a bare minimum. In my case, I have my phone locked down to the lowest security level possible and still be useful and I don’t use the biometric finger ID feature at all.
This is one of those “Damned if you do, damned if you don’t,” things. You have to assess the threats you face and decide how far you are willing to go, to gamble your life from your money to your very life itself, it is that capable and bad.
Goodman, Marc. “Future Crimes: Everything is Connected, Everyone is Vulnerable and What We Can Do About It.” Doubleday. New York. 24 February 2015.
AT LEAST, BE INFORMED!