Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

But, and here is the important part, those 'leaked fingerprints' in the wild are not digitally preserved. It would actually take some effort to preserve on a scene. The comparison is not apt.


sort by: page size:

You are missing the point.

The point is that reader has those preserved and stored somewhere, while fingerprints that a person just leaves about by going about their day are not. Just the fact that they are stored is an issue. Note, this is a response to the original question of 'pfft, a person leaves fingerprints all the time anyway'.

Again, the comparison is just not apt.


Browsing fingerprints would not be the same.

However, Fingerprints cannot be practically hashed.

Fingerprints aren't secure. You literally leave them on anything you touch.

> A fingerprint on the other hand cannot be observed.

This is not correct [1].

It won't be that long before someone gets around to training some sort of ML system to scour photographs to extract fingerprints and start building a database of everyone's fingerprints. These databases will only expand in coverage/accuracy and the quantity leaked will only increase. Fingerprints for authentication will not survive the next decade.

[1] https://www.csoonline.com/article/3268837/busted-cops-use-fi...


They are not pretending that. The article states that the fingerprints in the photo were unusable.

> They said it was all ok because that the actual fingerprints aren't stored on the system, only information derived from the fingerprints

I hate this blatantly flawed reasoning. The data collection is the problem, and it doesn't matter if you store pictures of fingers/faces/irises/ids or just their post-process signatures, it's still data collection.


I don't think fingerprints are the same at all. While still having privacy implications, fingerprints to match against broadcast content aren't uploading your family photo or caps from your home movie if that's what you're showing on screen.

Just because fingerprints were found at the scene of the burglary doesn't mean you take them and republish them somewhere else.

To be fair, allowing the arbitrary and (practically) undetectable leaking of fingerprints is also a no-no.

Fingerprints aren’t passwords here.

I wonder how they are doing this. Wouldn't a low quality recording render this fingerprint invisible?

The fingers are out of focus. No amount of image resolution will correct for out of focus optics at the time the photo was taken. The fingerprints are nowhere to be found in this picture. So clearly something is bogus about the claims in the article.

Exactly, the fingerprints aren't material evidence in this case, but communicative testimony that could lead them to unspecified future material evidence on their phone. It's not the same thing at all.

Because fingerprints are not sufficient to generate / recover KEKs from.

> Kids or coworkers are not going to make fake fingerprints

In truth I have seen this done to mess with people using cellotape and creativity, so I have to warn you this is not a reasonable assumption.


fingerprints aren't secrets. you leave a copy on everything you touch.

Fingerprints are more like your SSN. You shouldn't trust anyone to store them and not share them.

Except that the photo they've shown is clearly way too low quality to get fingerprints. Presumably they actually used his palm (the article sort of mentions it), and they have a really small pool of people that they suspected so they could just manually compare his palm with known palm prints.

I think that's fine though.

next

Legal | privacy