About: Borrowed Biometric Bypass   Sponge Permalink

An Entity of Type : owl:Thing, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

Once upon a time, infiltrating a base was pretty easy: just knock the guards out, take the keys, and get in. Fortunately, modern high-tech facilities, or in The Future have more cunning devices, and can identify the guards by unique biological features, such as handprints or retinal scans. These cunning devices are reliable, efficient, and not prone to believing just anyone who happens to be wearing the right uniform. Great, huh? Note that this is not about bypassing biometric scanners in in general. This is about the bloody way to get around them. Examples of Borrowed Biometric Bypass include:

AttributesValues
rdfs:label
  • Borrowed Biometric Bypass
rdfs:comment
  • Once upon a time, infiltrating a base was pretty easy: just knock the guards out, take the keys, and get in. Fortunately, modern high-tech facilities, or in The Future have more cunning devices, and can identify the guards by unique biological features, such as handprints or retinal scans. These cunning devices are reliable, efficient, and not prone to believing just anyone who happens to be wearing the right uniform. Great, huh? Note that this is not about bypassing biometric scanners in in general. This is about the bloody way to get around them. Examples of Borrowed Biometric Bypass include:
dcterms:subject
dbkwik:all-the-tro...iPageUsesTemplate
dbkwik:allthetrope...iPageUsesTemplate
abstract
  • Once upon a time, infiltrating a base was pretty easy: just knock the guards out, take the keys, and get in. Fortunately, modern high-tech facilities, or in The Future have more cunning devices, and can identify the guards by unique biological features, such as handprints or retinal scans. These cunning devices are reliable, efficient, and not prone to believing just anyone who happens to be wearing the right uniform. Great, huh? Unfortunately, the more dangerous individual won't need to get your guards to agree: He'll find someone with the right access, and engage in some very unpleasant surgery. He may remove a guard's eye, or he may simply lop off his or her head and hand with a big ol' sword. Then equipped with those body parts, he'll simply apply these to the biometric authentication device in question, and get through. This raises the question of whether or not any such devices would be able to tell whether the hand or eye in question was attached to a living body. In reality, this actually is a key consideration in designing biometric security. Some devices (the cheaper ones, mostly) ARE vulnerable to this kind of thing. Needless to say, such a weakness is considered an absolute disqualification for usage in any classified government facility. This is rarely used by good guys, as it's definitely on the morally dubious side of things, even if you don't kill the victim. A more moral person may have to talk or threaten the guard into showing his Eye-D, or simply wrestle the poor Mooks into place. Note that this is not about bypassing biometric scanners in in general. This is about the bloody way to get around them. Examples of Borrowed Biometric Bypass include:
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software