[ALUG] (no subject)
TGH Solutions
info at tgharusha.com
Sat Nov 5 10:52:04 EAT 2016
Ismail: I think that is where we are going with most only services
providing the option for two factor authentication.
Titus: I think that was Andreas's point. No matter how good you make the
algorithm, if you have the source pattern used to generate it then it all
amounts to nothing. If you require alot of detail from the source then your
rate of false negatives increases as well.
On Nov 5, 2016 10:38 AM, "Ismail Settenda" <ismailmss at gmail.com> wrote:
> To add to that; I do not think any one device can really give you total
> security; I believe total security will come from a layered approach as it
> is in the strength of the combination of preventive methods that will offer
> a semblance of 100% security and even then there is also the human factor.
>
> Physical access coupled with fingerprint, facial or eye is secure however
> human awareness with the preventive physical access coupled with
> fingerprint, facial or eye scanners is a really good attempt at making
> things really secure.
>
> Regards
>
> --
> Ismail
>
> On 5 November 2016 at 09:47, TGH Solutions via Linux <
> linux at lists.habari.co.tz> wrote:
>
>> Well, I think most people don't understand how biometric works, which is
>> why there is an illusion of security. People don't understand its basically
>> a complicated password generated algorithmically at scan time.
>>
>> But in that sense, it still is better in most cases where end users get
>> to pick passwords and they pick 123456. It'll be better then 90% of the
>> passwords in use and will require the hacker to have physical access to the
>> device, which is quite a big barrier.
>>
>> On Nov 4, 2016 10:40 PM, "Andreas Tauscher via Linux" <
>> linux at lists.habari.co.tz> wrote:
>>
>>> A little bit a pragmatic view:
>>> Locking the phone with the fingerprint is better than leaving it
>>> unlocked.
>>> But if somebody thinks this lock is secure: You are wrong.
>>>
>>>
>>> _______________________________________________
>>> The Arusha Linux User Group: http://unix.or.tz
>>> Linux mailing list
>>> Linux at lists.habari.co.tz
>>> http://lists.habari.co.tz/cgi-bin/mailman/listinfo/linux
>>>
>>> The Arusha LUG mailing list is generously hosted by Habari Node Ltd:
>>> http://www.habari.co.tz/
>>>
>>> The above comments and data are owned by whoever posted them (including
>>> attachments if any). The mailing list host is not responsible for them in
>>> any way.
>>>
>>
>> _______________________________________________
>> The Arusha Linux User Group: http://unix.or.tz
>> Linux mailing list
>> Linux at lists.habari.co.tz
>> http://lists.habari.co.tz/cgi-bin/mailman/listinfo/linux
>>
>> The Arusha LUG mailing list is generously hosted by Habari Node Ltd:
>> http://www.habari.co.tz/
>>
>> The above comments and data are owned by whoever posted them (including
>> attachments if any). The mailing list host is not responsible for them in
>> any way.
>>
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.habari.co.tz/pipermail/linux/attachments/20161105/13716813/attachment.html>
More information about the Linux
mailing list