Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <b6q6djtri1lomna1sr7lnl23rc1u8rsbkv@4ax.com>
Deutsch   English   Français   Italiano  
<b6q6djtri1lomna1sr7lnl23rc1u8rsbkv@4ax.com>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!feeds.phibee-telecom.net!3.eu.feeder.erje.net!feeder.erje.net!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: Jeff Liebermann <jeffl@cruzio.com>
Newsgroups: rec.bicycles.tech
Subject: Re: Artificiqal Intelligence
Date: Sat, 31 Aug 2024 12:28:03 -0700
Lines: 68
Message-ID: <b6q6djtri1lomna1sr7lnl23rc1u8rsbkv@4ax.com>
References: <twuxO.436943$%lIc.226482@fx13.iad> <sd4fcj130gs0ju3dcjdbb76j55mhpekvl1@4ax.com> <va87da$ii8a$1@dont-email.me> <lzNxO.682748$ZhK.134751@fx14.iad> <va8m8p$k637$8@dont-email.me> <MW0zO.80106$yI05.1347@fx38.iad> <vaij9j$2ikp6$1@dont-email.me> <qApzO.2872$YYs6.631@fx47.iad> <omascj1gj9pseit1p24vr0mv8nnt23ljog@4ax.com> <nmuscj9g37u72s2o53pj82kcqoc15650rt@4ax.com> <rhb1dj5uj2klheu69kkmmuarknn9vof7og@4ax.com> <var4eg$6c6p$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
X-Trace: individual.net N6uMPQHneemVCSQpzKlN3w2cL3YSQzGBm5KEJShCjSX6dZrQAB
Cancel-Lock: sha1:lhqKY/wqh+HFgY7PN68e4rgvk1M= sha256:jfGTra6TNKBemy+nfWCftiMGR49UZikbrtVggNmYQM4=
User-Agent: ForteAgent/8.00.32.1272
Bytes: 4519

On Thu, 29 Aug 2024 20:40:47 -0400, Frank Krygowski
<frkrygow@sbcglobal.net> wrote:

>On 8/29/2024 1:42 PM, Jeff Liebermann wrote:
>> On Wed, 28 Aug 2024 08:23:56 +0700, John B. <slocombjb@gmail.com>
>> wrote:
>> 
>>> The thing I don't understand is, why use an "anything" reader on a
>>> hand phone? I've been using hand phones since they were small enough
>>> to be carried in one hand and I've never used a
>>> thumb/hand/nose/anything/ reader and even more telling I've never seen
>>> anyone else use one... in at least 4 different countries.
>> 
>> A fingerprint reader is quite convenient:
>> - I use the fingerprint reader as a substitute for the phone on/off
>> button.
>> - Some web sites use the fingerprint reader to speed up a web login
>> process.  Instead of a login, password, 2FA, wait for the text
>> message, and type in the 2FA number, using the fingerprint reader does
>> it all in one action.  I use it for login to various medical web
>> sites, where I usually need to login and check something in a hurry.
>
>Yes, that's an advantage I've used quite a lot.
>
>> Unfortunately, fingerprint readers are far from perfect:
>> "Your Fingerprint Can Be Hacked For $5. Here’s How."
>> <https://blog.kraken.com/product/security/your-fingerprint-can-be-hacked-for-5-heres-how>
>
>Like most "Danger!" warnings, I think that one is overblown. The hacker 
>would have to observe a clean fingerprint, would have to know it's from 
>the proper finger, then go though a multi-step process (Photograph, 
>process in Photoshop, 3-d print on acetate, re-cast using wood glue) to 
>get something that might work, might not work.

The aforementioned complicated process has the advantage of not
requiring a mold to be made from the victims fingers.  The fingerprint
image lifted from a glass or plastic object is sufficient.

Also, it's fairly simple (but expensive) to build a 3D finger print
scanner:
<https://3d.idintl.com/explore-3d-fingerprinting/>
and print the results with a 3D printer.
<https://3dprint.com/271540/d-defcon-fooling-biometric-sensors-using-3d-printed-fake-fingerprints/>
The behind the display fingerprint scanners use multiple cameras and
3D scanning.  I haven't had any luck with those:

"Apple invents a new Approach to Touch ID by using Multiple Cameras
under the Display to capture 3D Fingerprint Data"
<https://www.patentlyapple.com/patently-apple/2018/08/apple-invents-a-new-approach-to-touch-id-by-using-multiple-cameras-under-the-display-to-capture-3d-fingerprint-data.html>

>I can see the fictional characters in "Mission Impossible" doing it to 
>thwart an evil genius preparing for world domination. I doubt anyone 
>would be using it in real life to access my medical records.

Not a problem.  There seems to be an endless supply of evil geniuses
and overly curious teenagers who can break into anything.

If I wanted your medical records, I would simply go to the appropriate
department at the hospital and ask for a copy of your medical records.
That last time I did that for obtaining some test results, all they
asked for was my date of birth (because they were in a hurry).


-- 
Jeff Liebermann                 jeffl@cruzio.com
PO Box 272      http://www.LearnByDestroying.com
Ben Lomond CA 95005-0272
Skype: JeffLiebermann      AE6KS    831-336-2558