From: watson@tds.com
To: “E. ALLEN SMITH” <EALLENSMITH@ocelot.Rutgers.EDU>
Message Hash: 546dc2bbc87bee307446db9ec43df67fabb188639e454fbb7691ca0991d0e3f4
Message ID: <Pine.SOL.3.91.960216175037.4163A-100000@mailman.tds.com>
Reply To: <01I1AFAUEXFKA0V3BM@mbcl.rutgers.edu>
UTC Datetime: 1996-02-18 08:34:33 UTC
Raw Date: Sun, 18 Feb 1996 16:34:33 +0800
From: watson@tds.com
Date: Sun, 18 Feb 1996 16:34:33 +0800
To: "E. ALLEN SMITH" <EALLENSMITH@ocelot.Rutgers.EDU>
Subject: Re: anonymous age credentials, sharing of
In-Reply-To: <01I1AFAUEXFKA0V3BM@mbcl.rutgers.edu>
Message-ID: <Pine.SOL.3.91.960216175037.4163A-100000@mailman.tds.com>
MIME-Version: 1.0
Content-Type: text/plain
Did anybody see the movie Demolition Man? Biometrics were "hacked"
there. I guess it's hard to be sure, but it seems something in your
brain is tougher to extract than a finger or an eyeball. The texts say a
combination is a good idea.
On Fri, 16 Feb 1996, E. ALLEN SMITH
wrote:
> From: IN%"samman-ben@CS.YALE.EDU" "Rev. Ben" 15-FEB-1996 20:05:34.89
>
> >The only REAL way of authentication is biometrics. Anything else can be
> >swapped. But if you amputate someone's hand or retinas then they won't
> >work(check for things like blood flow, etc.)
>
> Actually, a simulation ought to work pretty well at fooling most extant
> devices, and any devices likely to be developed soon. Now, fooling the guards
> watching you at a secure site may be a problem (a hand up your sleeve?), as
> may getting someone else's biometric information in the first place. The
> latter gets into the area of cryptography since whoever has such information
> (other than the original possessor) is likely to hash it anyway.
> -Allen
>
Return to February 1996
Return to “watson@tds.com”