Very strange gibberish strings with Cyrillic characters that appear in random websites and elsewhere

In my work with online orders, I started noticing an extreme abnormality in a few orders. In one field that wasn’t restricted there appeared a string of over 3 million characters that were totally gibberish consisting mostly … Continue reading Very strange gibberish strings with Cyrillic characters that appear in random websites and elsewhere

Cardiac Biometric

MIT Technology Review is reporting about an infrared laser device that can identify people by their unique cardiac signature at a distance: A new device, developed for the Pentagon after US Special Forces requested it, can identify people without seein… Continue reading Cardiac Biometric

Cardiac Biometric

MIT Technology Review is reporting about an infrared laser device that can identify people by their unique cardiac signature at a distance: A new device, developed for the Pentagon after US Special Forces requested it, can identify people without seeing their face: instead it detects their unique cardiac signature with an infrared laser. While it works at 200 meters (219… Continue reading Cardiac Biometric

Fingerprinting iPhones

This clever attack allows someone to uniquely identify a phone when you visit a website, based on data from the accelerometer, gyroscope, and magnetometer sensors. We have developed a new type of fingerprinting attack, the calibration fingerprinting attack. Our attack uses data gathered from the accelerometer, gyroscope and magnetometer sensors found in smartphones to construct a globally unique fingerprint. Overall,… Continue reading Fingerprinting iPhones

Biometrics: Giving the Government the Finger

A federal court has ruled that suspects can’t be forced to provide a biometric key to unlock their digital devices during an investigation. When two individuals were involved in a Facebook sextortion case, threatening to release an embarrassing … Continue reading Biometrics: Giving the Government the Finger

How to defend against adblock detection/adblock subscription leaks?

Is there a best practice (or useful extension) for defending against adblock fingerprinting techniques? I’m not asking about how to bypass adblock detection as such, but rather how one might appear invisible (or spoof one’s i… Continue reading How to defend against adblock detection/adblock subscription leaks?

Using a Fake Hand to Defeat Hand-Vein Biometrics

Nice work: One attraction of a vein based system over, say, a more traditional fingerprint system is that it may be typically harder for an attacker to learn how a user’s veins are positioned under their skin, rather than lifting a fingerprint from a held object or high quality photograph, for example. But with that said, Krissler and Albrecht first… Continue reading Using a Fake Hand to Defeat Hand-Vein Biometrics