Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:04):
Welcome to tech Stuff, a production from I Heart Radio.
Hey there, and welcome to tech Stuff. I'm your host,
Jonathan Strickland. I'm an executive producer with iHeart Radio and
a love of all things tech. It is time for
a classic episode. This episode originally aired on April two, fourteen.
(00:26):
It is called Biometrics Digital Fingerprinting Enjoy. We thought, hey,
we should talk about biometrics, and then we started looking
into it and getting really excited, and then we realized, hey,
there's a lot to talk about, right. You know. Biometrics,
of course, being the measurable biological or behavioral characteristics used
(00:49):
for for any given individual. Yes, this is what how
the FBI says, this is what the biometrics are. So, uh,
you know, it's one of those things where we knew
it was a huge time bick and we decided to
narrow it down. So today we're specifically focusing on your fingerprints. Well,
not your fingerprints, I mean, I mean everyone's fingerprints. No,
see the person sitting next to you, No, not that one,
(01:12):
the other one, that person's fingerprints. That's that's the one
we're concentrating on. So yeah, because everyone has has different fingerprints,
I mean like everyone, right, and this is something that
has been known for a while but then forgotten and
then rediscovered. So we're going to talk about that because
it's kind of funny. So these days we think of
biometrics as sort of those automated ways to verify your
(01:33):
identity based on some sort of biological characteristic, like you know,
the eye scan or the fingerprints scan or whatever. Vocal
scans as well, you know, like the voice imprint. Lots
of different Hollywood versions of this. But you know, again,
going into that fingerprint approach, we thought that, uh, you know,
we we look at not just how we've defined it
(01:54):
and how stuff works, but look at a whole history
of fingerprinting. We're not the first podcast to do this,
by the way, certainly not. Josh and Chuck of Stuff
you Should Know did an episode on April called how
Fingerprinting Works, and they go pretty deeply into the history
and say many pithy things. So if you would like
to check that episode out, you can go to Stuff
(02:17):
you Should Know dot com right and just stick around,
because we're gonna say some pithy things too. We are
going to cover some of the history kind of a
quick overview, but first I thought I would read a
couple of little excerpts from our article on how fingerprints
scanners work, because there are a couple that I thought
were really interesting from how stuff works dot Com. Neither
of us actually wrote this. Nope, Nope, I didn't write
(02:37):
this one. This one says people have tiny ridges of
skin on their fingers because this particular adaptation was extremely
advantageous to the ancestors of the human species. The pattern
of ridges and valleys on fingers make it easier for
the hands to grip things in the same way a
rubber tread pattern helps to attire grip the road. The
other function of fingerprints is a total coincidence. Like everything
(03:02):
in the human body, these ridges form through a combination
of genetic and environmental factors. The genetic code and DNA
gives general orders in the way skin should form in
the developing fetus, but the specific way it forms is
a result of random events. The exact position of the
fetus in the womb at a particular moment, and the
exact composition and density of surrounding amniotic fluid decides how
(03:22):
every individual ridge will form. This, by the way, is
how identical twins can have different fingerprints pretty cool because
you know, genetically they're identical, but their fingerprints are different,
still different. Interesting. So looking at this history, you might think, Okay,
I've heard about fingerprinting, particularly when it applies to law enforcement.
(03:45):
That's probably where a lot of people are familiar with it,
besides the verification. Sure, sure, and uh and a couple
popular media pieces have talked recently about Um. I mean
you you get things like Ripper Street or Sleepy Hollow
having characters going like this new fingerprinting thing in the amaging,
amazing Age of Victoria. Um, not not so much. Actually,
(04:05):
so fingerprints people, Well, first of all, people have been
aware of them for ages because we're curious folks, you know,
human beings. We we were very curious and narcissistic. We
like to learn stuff and we like to look at ourselves.
And how do I know that this dates back are
ages and ages and ages ago because we have prehistoric
(04:26):
depictions found in Nova Scotia and it depicted a hand
with ridge patterns on the skin. Now, that does not
mean that the ancient Nova Scotians were familiar with the
fact that all the fingerprints were unique, and therefore no
to individuals had the same ones, but at least showed
that you know, yeah, they noticed them. Yeah, but the
(04:48):
ancient Babylonians may have actually used fingerprints to differentiate people. Um,
we've found fingerprints in clay to to sign business transactions,
and the ancient Chinese used inked fingerprints for both business
purposes and child identification. And in the thirteen hundreds in Persia,
official government documents often included fingerprints, probably to indicate they
(05:11):
were authorized and official. Now, according to the US Marshall's Office,
which has an entire web page devoted to fingerprinting in
the history of it, one government official in Persia at
that time made the observation that no two fingerprints were alike,
which obviously would be very important if you're making a
document official or authorized. But it wasn't until the eighteen
(05:32):
eighties that that amazing Age of Victoria previously mentioned that
we got some kind of official classification system, right. It
wasn't until the modern era that we started seeing it.
In uh story, it wasn't even in wide use at
the beginning. It was just kind of exploratory. Dr Henry
Faulds back in eighteen eighty proposed using fingerprints for identification
(05:54):
as well as a means of classifying them. So he
forwarded these ideas to a certain Charles Darwin, very important
historical figure in his own right. But Darwin at the
time was towards the end of his life and felt
that he did not have the necessary UH time and
energy to devote to this thought. It was really interesting, however,
(06:14):
so he forwarded the information along to a cousin of
his named Francis Galton. So false would write a scientific
paper about his methods and actually identified a fingerprint, ascertain
the identity of the person who left that fingerprint on
bottle of alcohol. Shouldn't come as any surprise. I guess
(06:36):
this brings us all together. It does. Then in three
Mark Twain would would use this this new startling scientific
information in a story. Yeah, it was in Life on
the Mississippi, And in that one of the elements of
that story is a murderer is identified through the use
of fingerprints. And he would revisit the idea in a
(06:56):
book called Putting Head Wilson Putting Head. Well, so it's interesting. Now,
this was before anyone was actually using UH fingerprints in
any kind of criminal investigations on an official basis. It
had not been science fiction, really was. It kind of
was so so that was exciting. But but soon in
(07:16):
eighteen eighty eight, Sir Francis Galton, remember the cousin to
Charles Darwin, who had received information about this about ten
years previous, um, began his own study of fingerprints. Yep.
He wrote a book in eighteen ninety two and put
forth a formal classification system and identify the tiny characteristics
used to differentiate fingerprints, which now we call Galton's details.
(07:39):
He also observed that fingerprints don't change over the lifetime
of a person, so the ones you have when you're
a kid are the same ones you have when you're old.
Originally wanted to kind of link fingerprints to certain types
of traits like intelligence or heredity, which is so racist. Yeah,
kind of essentially, I think this was almost in an
(07:59):
attempt And I don't know enough about Galton to say
this for sure, but it seems like an attempt to
justify certain societies beliefs in certain people, that kind of thing. Yeah,
it wasn't necessarily so racist, but um, but it kind
of runs in that direction. Yeah, Because I mean, the
idea that you could identify a person's intelligence based on
(08:20):
their fingerprints already seems a little sketchy, and in fact,
he did determined that there was no connection. There was
no there were no identifier marks in a person's fingerprints
that would give you any clue as to that person's
intelligence or genetic background. However, he did figure out that
there were a lot of differences and that people didn't
(08:40):
weren't likely to have the same fingerprints. Yeah, unlikely, in
the order of one in sixty four billion, that's pretty unlikely.
So in eight we get the first use of fingerprints
in a criminal investigation on an official level. Uh one vs.
Tech and I I'm sure I butchered his last name.
(09:02):
Who was a police officer in Argentina used them in
a murder investigation. It was actually a really tragic case,
but the discovery meant that he was able to solve
this mystery and prove that the person that was believed
to have been the murderer was in fact not the killer. So, uh,
not only was it the first use, but it was
(09:24):
a pretty dramatic example of it. Now, between we're gonna
skip to nineteen eighteen, but between the late nineteenth century
and the early twentieth century he started to see fingerprints
get adopted into various legal organizations all around the world.
The United Kingdom and the United States were leading the way,
but it was all over the place. So by nineteen
(09:45):
eighteen you have Edmund Lekard who says that you only
need twelve points of similarity between an individual's fingerprint and
a target fingerprint to serve as a positive identification. Now
you may have heard about those twelve points of singularity,
that this is somehow like a legal thing, that if
you were able to meet those twelve points of singularity,
(10:06):
you have the legal basis to say this person did this.
Uh not necessarily a legal definition at all. In fact,
UH countries have very very different ways of saying whether
or not a fingerprint is a valid match for another one,
and some, like the United States, do not have a
(10:27):
minimum number of resemblances that need to be there in
order for you to call it a match. Now, usually
law enforcement agencies rely on experts who give their expert
opinion and therefore putting their own reputation on the line
as to whether or not something matches. And of course,
now these days we rely very heavily on digital information,
(10:48):
which with very very complex and intelligent algorithms that will
that will do some really interesting like work. Yeah, and
so with that, you know, the the level of a
confidence grows quite a bit. So, uh, just so you
know that twelve points of similarity not necessarily a legal standard.
Nineteen four that's when Congress enabled had an act that
(11:11):
established the new division for the Federal Bureau of Investigation
also known as the FBI. Uh And this division was
called the Identification Division. I bet you can guess what
it did. So it became kind of a centralized fingerprint
file for the entire country. So not it wasn't necessarily
uh standard procedure for every law enforcement agency out there
(11:33):
to send a copy to the FBI, But that's kind
of what started to happen, so that, uh, there could
be this sort of cooperation between different departments which often
wouldn't have any communication with each other. Sure sure, by
nineteen forty six, the FBI would have processed more than
a hundred million fingerprint cards. Yeah, not just processed, but
(11:53):
they did that by hand, right right, and it would
be two million by one, So two million physical cards
with fingerprints on them. I mean, just imagine how many, like,
how how much storage you need just for me, it's two.
I can't even I can't even imagine it. But by
the FBI introduced the Integrated Automated Fingerprint Identification System or
(12:18):
if SO. It's the largest fingerprint database in the world
and its computer automated. It takes about twenty seven minutes
for the system to comb through every single file in
its database to find out if there is a potential match.
During a criminal investigation, it's different. If it's a civil case,
it's actually like more than an hour. But for criminal investigation,
(12:41):
for all the criminal files that are storing this database,
twenty seven minutes from the time you actually input the
suspects fingerprint. I imagine that's a lot faster than whatever
in turn they sent down to the basement. Well yeah,
because I mean you would have to narrow down the
person quite a bit before you could ever start comparing. Right,
(13:02):
this is a man, so cut out all the women
and then go like there are seventy million of them
down there. Uh yeah, that would be that would be
a daunting task. So in the digital age, we can
actually analyze this stuff way better than we ever could,
Like you don't have to use the naked eye anymore
and try and find those little ridges and stuff. You
(13:22):
can actually rely very heavily upon computer systems, and once
we started getting those computer systems in place, they pretty
soon thereafter became um commercially available. Yeah. Yeah, we had
some fingerprint verification systems that have been around for a
few decades now. On the consumer level, they've only been
available fairly recently. And you might be thinking, oh, yeah, yeah,
(13:44):
the iPhone five s because it has that that fingerprint
scanner where you can use that to log into your phone.
That's the first smartphone to ever use that, right, Nope, no, no,
there's actually a mobile device. The first mobile device that
I found was a one that dated from two thousand three,
the H and Boy. The name of this is phenomenal.
HP names their products in such catchy ways. It's the
(14:07):
HP I pack, I p a Q P PC pocket PC.
Oh yeah, it just rolls off the tongue. Yeah, it
really is. I mean, with a name like that, how
could you resist I phone my phone? So at any rate,
this was the first mobile device to incorporate finger scanning technology,
(14:28):
but it was also sort of the edge of a
boom for the technology. UM it was being extended for
for wide consumer use. At the time. I mean, you know,
keyboards and mice had them, laptops had them. You could
buy a USB scanner for multipurpose use and encrypt everything
with your fingerprint, right, you could end up creating, for example,
with a copier. You could end up telling people, all right,
(14:49):
this group of folks are authorized to make copies. Anyone
who's not on this list cannot make copies. And you
would walk up to make copies. And if you weren't
on that list, then I guess no fun Christmas party
Shenanigans for you. But but but also opening this up
to the consumer market meant that a lot of people
started finding the flaws in the technology. Oh yes. In
(15:10):
December five, clarks And University researchers announced that they could
fool of the world's fingerprint scanners using an incredibly sophisticated,
expensive substance. Yeah, they could just go out to toy
store and buy some Plato and essentially make a copy
(15:30):
of a fingerprint and put it on any optical scanner.
And we'll talk about the optical scanners in a little bit.
And it worked really well. So that gave people some
pause and thought, maybe we should come up with something
besides optical scanners too, because fingerprint identification is a great idea,
but if it's if it's that easy to fool, we
have to find a different way of measuring it. So
(15:51):
then there was a totally different expose on September one,
two thousand and six, when our beloved MythBusters decided to
do a fingerprint scanner scam of their own. They decided
to see if they could fool one, and this one
was a little different. It wasn't just an optical scanner.
It was supposed to also detect sweat from pores in
the fingertips. Okay, so so you can't just use a
(16:13):
lump of plato or good photograph. You have to have
something that sweats has to have to otherwise it's never
gonna work. So what did they do. They made a
latext copy of a fingerprint and then they did a
very sophisticated thing in order to simulate sweat. Yeah, and
it worked. So if you can't play dough it, lick it,
(16:37):
I guess is the moral of that story. I think
I think that that's really what we all should learn
from this today. Probably so anyway, they're still seeing this
kind of technology being rolled out. But it's not just
an optical scanners, and even optical scanners have gotten a
lot better than they were back in two thousand five.
We'll be right back with more digital fingerprinting after these
(16:59):
short messages. All right, I had just talked about optical scanners,
and those are one of the ones that are the
easiest to explain and uh and fairly common even today.
In fact, not my work computer, but my home computer
(17:20):
has my home laptop has a little optical scanner. So
if I want to log in, I can just swipe
my finger across it. So optical scanners use something that
is found in digital cameras and camcorders called a charge
coupled device or c c D. Now, essentially that's a
light sensor. It's got an array of things called photo sites.
(17:41):
Now that's light sensitive diodes, and it's works pretty much
the way you would imagine. So photons, those little particles
of light when they make a collision with these photo sites,
it generates a little electrical signal and those can then
be compiled and converted into a digital image. And it's
essentially the same process that digital cameras used to take pictures.
(18:02):
And here's the thing though, So if I put my
finger on an optical scanner, I'm actually blocking light. And
unless you happen to be e T the extraterrestrial, your
finger probably isn't emitting light. So how the heck is
it getting this picture? Well, it uses a flash, yeah,
except in this case of flash is probably like a
(18:22):
single l ED or for some scanners maybe an array
of LEDs light emitting diodes in other words, and so
that provides the light that is necessary to take this image.
And uh, then the c c D creates an image
of your fingertip. However, it's a little funky. It's inverted, right.
The dark areas are going to represent the ridges that
(18:44):
the raised portions of your fingertip, and the light areas
are going to represent the values. Yeah, so it's kind
of like looking at a negative, a photo negative. Uh.
And it makes sense because stuff that's reflecting more light
is going to create a lot a bigger electrical signal,
thus creating that you know, the charge couple device is
going to make that into a darker portion the valleys.
(19:05):
The light is not as much of it's going to
reflect back, so you get a weaker electrical signal. That's
why it gets lighter. Uh So, if you were to
scan your finger and UM and it tells you that
it's a good scan, because most of these devices also
have some sort of fail safe in them that will
alert you if there wasn't enough enough differentiation between the
(19:28):
dark and light parts. Right, that the same way that
you're that your camera UM sometimes will take a picture
that's that's overdeveloped or underdeveloped. The same thing can happen here. Yeah,
So if you wanted to, like if you most of
the software has let error function built into it, so
it can tell and it will ask you to scan again, right,
So then you would scan again. So if it's the
first time you're using it, then you would also end
(19:49):
up creating a profile in some way. It might not
be you, it might be an administrator, but something that
links the fingerprint to who you are and what access
you are supposed to have will have then on subsequent uses,
what will happen is that when you scan your finger
it will go through its database of of identities that
have fingerprints attached to them look for you. If you're there,
(20:12):
then it will authorize you for whatever use you're allowed. So,
for instance, on my home computer, I've given myself very
strict restrictions because I am not to be trusted. Uh,
and so all I'm able to do is play a
pirated copy of Flappy Bird. That's not true, I don't
have Flappy Bird. But at any rate, you know, that's
(20:33):
the basic You know, that's the basic procedure, right, And
and so if your fingerprint is not found in that database,
you get an error. So either you have to swipe
it again or or scan it again if it's not swipe.
All depends on what kind of scanner you're at, or
you end up saying, uh, the jig is up, you
got me, I don't really belong here, and then you
(20:56):
run away. Um. So that that's the basic thing. And
what they're looking for. It's not the entire pattern of
your fingertip. It's looking for for a specific minutia about it,
certain types of patterns and it. And it depends on
the software that the scanner is using. Um. It might
be the places where the ridges converge, um or split
(21:18):
apart at the end, or um any any other kind
of detail. It's going to be unique to you. Right.
So in other words, all has to do is say, hey,
there are these three points on this fingertip, uh that
are unique that that's all I'm concerned about. And if
the fingerprint that scan has those three points, I know
it's this person and they can be let through by
constraining on the minutia, then you really cut down on
(21:40):
all the rest of the data that's necessary to have
a verification. Right, you can kind of throw everything else
out and concentrate on that and right. Uh and and
they're pretty good, like we said, though they can sometimes
be fooled by a really high quality picture of a fingerprint. Right,
So what if you instead of looking at a picture,
you were to make sure the fingerprint in some other way,
(22:02):
such as capacitance right, Because capacitense touch screens are totally
a thing. Yeah, So it's very similar to what a
regular capacityans touch screen is. So you know, there are
different ways of doing touch screens as well. There's somewhere
you have to use pressure. With the benefit of that
is you could be wearing gloves and still work a
pressure version. The downside is that when people are expected
(22:26):
to apply pressure to delicate material, they sometimes destroy it completely, right,
or it'll at least decrease the lifespan of that object
by quite a bit. Capacitance, however, uses weak electric fields.
So when you make contact with a screen, a touch screen,
that's using capacitance. See, you're a conductor. I don't mean
(22:49):
that you conduct trains, Nor do I mean that you
Maybe you do, Maybe you do, Maybe you do. Maybe
you conduct orchestras. Maybe you conduct orchestras on a train.
I don't know. But what I'm talking about, you do
call us because that sounds fascinating, kind of cool. Actually,
But now I'm talking about electrical conductivity. So we can
conduct electricity. It's not great for us to have a
(23:09):
lot of it, but tiny amounts don't hurt us. Sure,
And as it turns out, the ridges and valleys on
your fingers conduct slightly different amounts of electricity. This blows
my mind. I mean to think that the raised parts
of your fingerprint and the valleys of your fingerprint are
distinct enough to create a measurable difference in capacitance. You know,
(23:30):
it's something I never would have imagined. And it's really
a sensor issue here. I mean the fact that we
can create these these cells, these capacitor plate cells that
are sensitive enough to tell that yeah. Technology, so what's
happening is when you put your finger down on one
of these capacity scanners, you are actually you're you're acting
as a capacitance plate, right Your fingertip is acting is one,
(23:52):
and you already have other ones inside the scanner itself,
and it will end up creating voltages, and there will
be different differences in those voltages. The differences between the
ridges and the valleys based on how far away they
are from the from the cells. Yeah, so if it's
a valley, it's going to be lower capacitance because the
distance is greater. Capacitance is very dependent upon distance. So
(24:15):
if you move to capacitance plates far enough apart, they
will not be they will not work together. We've got
a little bit more to say about biometrics, but first
let's take a quick break. It's amazing that the valleys,
just by being that much further away will create a
(24:38):
different voltage than the ridges. And then having a whole,
a whole set of these cells set up next to
one another, um it allows the scanner to to sort
of make a digital picture of your fingerprint, but just
using electricity rather than light. The data from each one
is again compiled and then converted into an image of sorts. Yeah. Yeah,
you can think of it as like an image made
(25:00):
with electricity. And this is the sort of scanner that
the iPhone five S uses, so it's not an optical scanner.
One of the big benefits of this technology is that
it's easier to make it really compact and manatorized, which
is why you could find it in things like handheld electronics.
Right sure. Um. However, this technology can also be fooled
(25:21):
um sometimes by by mold of a finger um or
if someone has gone and calibrated the scanner to look
for things like like heat or a pulse. Um. You
can you can use one of those movie tricks, like
a gelatin or silicone mold of a finger um pasted
onto a different, different finger. Yeah. My favorite version of
getting past a capacitance or an optical scanner is to
(25:47):
use the finger that's been removed from the person who
had the authorization. Yeah, yeah, snipping, that's that's that's your favorite.
That's my favorite out in the field. That's what you like.
We had this discussion about the born identity before we
came into the podcast. This is totally true. Uh, I
don't like to discuss my actual field operative kind of
mentality and strategies. But yes, I do love doing that.
(26:10):
So thermal scanners, well, this one's a little different because
it's a it's a heat scanner, and again it's one
of those ideas where it measures the differences in heat
between ridges and valleys. Once again, you're going to get
a slightly higher temperature from the ridges than you do
with the valleys. The valleys that are essentially pockets of air.
There's some downside with this one. One of the problems
(26:32):
with thermal scanners is that if you if it takes
too long to do the scan, the temperature differences are
going to equalize across the and I wind up get
you just get a blank fingerprint, like a big blank fingerprint.
Not useful. This next one is super cool. It's ultrasonic
ultrasonic sensors, so right, yeah, Well, we did a whole
(26:55):
episode about ultrasound called How Ultrasound Works. Crazily enough that
published jan if you would like to hear all about
how this technology works. But um, but it's essentially echolocation. Yeah,
you're sending out sound signals and then you're waiting for
them to bounce back and by measuring the amount of
time it took to go out and come back. You
(27:15):
get an idea of how far away something is. Well.
That works, you know, in lots of different ways, including
being able to tell a fingerprint, being able to read
a fingerprint. It can go even deeper than that, exactly,
it can go into tissues. So if you wanted, you
could create an ultrasonic fingerprint scanner that scan not just
the fingerprint itself, but the underlying veins that are in
(27:36):
your finger which also are going to be unique to you.
So that's a lot harder to fake than a fingerprint.
Like you're not going to get a really high resolution
image of veins and then create a fake finger easily.
It would be really difficult. I mean, but you could
use your favorite application, which is removing someone's finger and
say that right unless you had also built into the
(27:59):
software to detect living tissue, because to see if blood
is moving through the veins the vessels. If it's not
detecting blood, it's good to say, y'all, this is messed up.
You need to send someone down right now the fingerprint scanner.
Things that are bad are happening. That's exactly what the
voice that uses too, I I assumed run into it
(28:20):
in the field all the time. So yeah, I mean
this is uh, you know, that's we're making light of
it because to be serious about it is so squeaky, terrifying.
But at any rate, it does mean that you can
build those sort of parameters, and so it's not just
looking at the fingerprint and the veins underneath, but also
to make sure it is truly a valid uh entry,
so that they don't you know, you don't end up
(28:42):
compromising security. Um. And there there's also I wanted to
mention very briefly the difference between those static uh fingerprint scanners,
especially the optical ones where you just hold your finger
down and you wait for it. It's kind of like
a copier, right right, and the swipe style that you
were talking about having on your home laptop exactly. So
if you've ever had a laptop or any other device
(29:03):
that has like a narrow window and you're supposed to
swipe your finger across that window, the reason for that
is that it's actually taking a series of quote unquote
images of your finger. However the implementation is actually being used,
it's it's doing then a quick series. Machines are really fast,
so they can do this without any real problem. They're
(29:23):
looking for those minutia that we talked about before, and
they're able to uh to use software to compile them.
But you know, it's it's nifty having the smaller form
factor because, like we said, uh, then you can miniaturize,
you can put them in something like a cell phone
and also make them cheaper. Exactly. Yeah, you've got this
little window and your finger moves past the window instead
(29:43):
of the window having to be big enough to So
it's it's really uh an interesting development and uh pretty cool. Also,
we can mention that biometric systems, many of them, not
necessarily all of them, but many of them end up
translating your fingerprint in to an algorithm that or an
algorithm rather does the translating that turns into a bunch
(30:04):
of ones and zeros, all right, right. A digitization um
sometimes called a hash. It's like a personal code, like
a really long pin. Yeah. So in this case, what
you would say is that it's not storing an image
of your fingerprint. It's not like if you were to
somehow hack into the computer you would suddenly see a
on your screen a representation of your fingerprint. It would
just mean that it would take the the pattern of
(30:26):
ridges and valleys and all the night nutia convert that
into this this hash, this this long string of ones
and zeros, and the next time you scan it, if
the if the same hash comes up, then it is
a match and it says, all right, identification has been verified.
But it's not actually like an actual real image of
your fingerprint. And the reason why a lot of these
(30:49):
companies try to talk about you know this as as
a big selling point is that it doesn't allow you
to recreate a person's fingerprint if you were to get
hold of those hash So it's not like you would say, oh,
if I just put this through an image program, I
suddenly get a picture of that fingerprint, you would just yeah,
that's that's the way. I think that the iPhone five
(31:11):
S and the Galaxy something something that the latest Samsung
incorporates it. And UM PayPal these days even has UM
fingerprint signatures on their app, and any any device that
allows you to in to scan in your fingerprint will
yeah let you pay for stuff on PayPal with that signature.
(31:32):
I'm sure we're going to see a lot of that
kind of stuff incorporate with things like the NFC technology
or even the low Bluetooth energy low energy bluetooth. Rather,
I should say, implementations where your fingerprint instead of having
to put in a pen, you just swipe your finger. Yeah,
you know, I don't know. I kind of hope that
it's an additional safety feature, not a standalone safety feature,
(31:52):
because you know, unlike a password or a pin, you
can't just change your fingerprint if it gets stolen. And
this hash issue add security to to the whole thing.
It's harder to but I'm sure that someone if they
really wanted to, could decode a hash and figure out
what that scan looks like. Yeah. Maybe, I mean, they
would have to have a lot of information, but it
(32:13):
is It is important to say that there is no
security feature out there that's going to be right right,
There's nothing out there, So having it as an additional tool,
I agree, Lauren, that's that's the best way of looking
at it. I think anytime we decide that we're going
to rely on a specific implementation and that's it and
(32:34):
we're done, we're good, then we're pretty much dooming ourselves
to getting hacked in some way down the line. And
that wraps up this classic episode about biometrics. It's still
a very very big topic, arguably an even bigger topic
today than it was back in very complicated. There's so
many things to take into consideration from security and privacy
(32:58):
issues too. You know, the problems with authentication in some cases,
ways to work around biometrics. There's a lot going on there.
I will likely do more episodes kind of diving into
not just the tech but the ethics behind biometrics. If
you have suggestions for topics I should cover in future episodes,
(33:19):
let me know the best way to do that is
over on Twitter. The handle is text stuff H s
W and I'll talk to you again really soon. Y
tex Stuff is an I Heart Radio production. For more
podcasts from my Heart Radio, visit the i Heart Radio app,
(33:40):
Apple Podcasts, or wherever you listen to your favorite shows.