Apple’s Device Analytics Can Identify iCloud Users

Researchers claim that supposedly anonymous device analytics information can identify users:

On Twitter, security researchers Tommy Mysk and Talal Haj Bakry have found that Apple’s device analytics data includes an iCloud account and can be linked directly to a specific user, including their name, date of birth, email, and associated information stored on iCloud.

Apple has long claimed otherwise:

On Apple’s device analytics and privacy legal page, the company says no information collected from a device for analytics purposes is traceable back to a specific user. “iPhone Analytics may include details about hardware and operating system specifications, performance statistics, and data about how you use your devices and applications. None of the collected information identifies you personally,” the company claims…

Continue reading Apple’s Device Analytics Can Identify iCloud Users

KYC: How do fintech companies validate official identity document numbers? [closed]

Online financial services these days offer their users the ability to "prove" their identity by having them take a picture (usually from multiple angles) of an official government-issued identity document (e.g., passport, ID card… Continue reading KYC: How do fintech companies validate official identity document numbers? [closed]

Escort card (Identification) for school security measures [closed]

Escort card (Identification) for school
When can a escort card (Identification) for school as part of security measures cannot be tampered?
Input Parameters : Photo image, Escort card material etc.
I meant to say, a fake duplicate escort c… Continue reading Escort card (Identification) for school security measures [closed]

Tracking People via Bluetooth on Their Phones

We’ve always known that phones—and the people carrying them—can be uniquely identified from their Bluetooth signatures, and that we need security techniques to prevent that. This new research shows that that’s not enough.

Computer scientists at the University of California San Diego proved in a study published May 24 that minute imperfections in phones caused during manufacturing create a unique Bluetooth beacon, one that establishes a digital signature or fingerprint distinct from any other device. Though phones’ Bluetooth uses cryptographic technology that limits trackability, using a radio receiver, these distortions in the Bluetooth signal can be discerned to track individual devices…

Continue reading Tracking People via Bluetooth on Their Phones

Wastewater-borne DNA reveals endangered species in fish markets

Despite protective measures being in place, endangered fish species are regularly caught then sold in open markets. And while visually searching them out can be difficult, a new technology could more easily allow authorities to know which species are b… Continue reading Wastewater-borne DNA reveals endangered species in fish markets