1996-02-18 - Re: anonymous age credentials, sharing of

Header Data

From: watson@tds.com
To: “E. ALLEN SMITH” <EALLENSMITH@ocelot.Rutgers.EDU>
Message Hash: 546dc2bbc87bee307446db9ec43df67fabb188639e454fbb7691ca0991d0e3f4
Message ID: <Pine.SOL.3.91.960216175037.4163A-100000@mailman.tds.com>
Reply To: <01I1AFAUEXFKA0V3BM@mbcl.rutgers.edu>
UTC Datetime: 1996-02-18 08:34:33 UTC
Raw Date: Sun, 18 Feb 1996 16:34:33 +0800

Raw message

From: watson@tds.com
Date: Sun, 18 Feb 1996 16:34:33 +0800
To: "E. ALLEN SMITH" <EALLENSMITH@ocelot.Rutgers.EDU>
Subject: Re: anonymous age credentials, sharing of
In-Reply-To: <01I1AFAUEXFKA0V3BM@mbcl.rutgers.edu>
Message-ID: <Pine.SOL.3.91.960216175037.4163A-100000@mailman.tds.com>
MIME-Version: 1.0
Content-Type: text/plain


Did anybody see the movie Demolition Man?  Biometrics were "hacked" 
there.  I guess it's hard to be sure, but it seems something in your 
brain is tougher to extract than a finger or an eyeball.  The texts say a 
combination is a good idea.

On Fri, 16 Feb 1996, E. ALLEN SMITH 
wrote:

> From:	IN%"samman-ben@CS.YALE.EDU"  "Rev. Ben" 15-FEB-1996 20:05:34.89
> 
> >The only REAL way of authentication is biometrics.  Anything else can be 
> >swapped.  But if you amputate someone's hand or retinas then they won't 
> >work(check for things like blood flow, etc.)
> 
> 	Actually, a simulation ought to work pretty well at fooling most extant
> devices, and any devices likely to be developed soon. Now, fooling the guards
> watching you at a secure site may be a problem (a hand up your sleeve?), as
> may getting someone else's biometric information in the first place. The
> latter gets into the area of cryptography since whoever has such information
> (other than the original possessor) is likely to hash it anyway.
> 	-Allen
> 





Thread