From: “E. ALLEN SMITH” <EALLENSMITH@ocelot.Rutgers.EDU>
To: samman-ben@CS.YALE.EDU
Message Hash: 45d2b228a63b277d6df340e39417bad1806e51e46494e2e429cae4bd04d25d1a
Message ID: <01I1AFAUEXFKA0V3BM@mbcl.rutgers.edu>
Reply To: N/A
UTC Datetime: 1996-02-17 01:13:00 UTC
Raw Date: Sat, 17 Feb 1996 09:13:00 +0800
From: "E. ALLEN SMITH" <EALLENSMITH@ocelot.Rutgers.EDU>
Date: Sat, 17 Feb 1996 09:13:00 +0800
To: samman-ben@CS.YALE.EDU
Subject: Re: anonymous age credentials, sharing of
Message-ID: <01I1AFAUEXFKA0V3BM@mbcl.rutgers.edu>
MIME-Version: 1.0
Content-Type: text/plain
From: IN%"samman-ben@CS.YALE.EDU" "Rev. Ben" 15-FEB-1996 20:05:34.89
>The only REAL way of authentication is biometrics. Anything else can be
>swapped. But if you amputate someone's hand or retinas then they won't
>work(check for things like blood flow, etc.)
Actually, a simulation ought to work pretty well at fooling most extant
devices, and any devices likely to be developed soon. Now, fooling the guards
watching you at a secure site may be a problem (a hand up your sleeve?), as
may getting someone else's biometric information in the first place. The
latter gets into the area of cryptography since whoever has such information
(other than the original possessor) is likely to hash it anyway.
-Allen
Return to February 1996
Return to “watson@tds.com”