Negative Security Effect of Biometrics Deployed in Cyberspace
Facts or Myths

Negative Security Effect of Biometrics Deployed in Cyberspace

Added on 18/Apr/2020

What can ‘probabilistic authenticators’ achieve in cyberspace? - A big question is often missing in the discussions about the deterministic authenticators (passwords/PIN and tokens) and probabilistic authenticators (biometrics); Are the users to blame when the login fails?’

Where the rejected users are solely to blame, their login would be justifiably denied. On the other hand, where the rejected users are not solely to blame, they should be given a fallback measure with which they can access what they must be able to access. In cyberspace, passwords/PINs are the fallback measures for the self-rescue in most cases.

Where biometrics is used together with a default/fallback password/PIN in a ‘multi-entrance’ deployment, we will see the security getting brought down to the level lower than a password/PIN-only authentication. It is, as it were, a below-one factor authentication.

This is what the probabilistic biometrics achieves in cyber space. Criminals will benefit.

Updated on 12/Feb/2020

New writing "What actually tells ‘probabilistic authenticator’ and ‘deterministic authenticator’ apart? " and "Cult of Convenience" are added at the end of this article.

........................................................................................................................

It was in 2001 on the website of a globally reputed electronics manufacturer that I first noticed this awkward phenomenon. They alleged that their face biometrics was going to displace the password. It immediately occurred to me what we could do when the system failed to recognize us. I quickly started to search for an answer on their website and found a brief statement in a Q&A corner "Don't worry if you are not recognized. You can get logged in by feeding the password that you had registered earlier".

No alt text provided for this image

The second encounter came a few months later at a security conference where another global brand hung a large poster reading "Farewell to Password by Fingerprints". I asked an attendant "What can we do when rejected by the fingerprints sensor?", to which he replied "Don't worry. You can rescue yourself by feeding the password that had been registered earlier". I raised the next question "Then, how would it be possible for you to allege "Farewell to Password by Fingerprints?” The attendant turned silent and never opened his mouth again. I gave up and left there.

 It has been as such since 2001 and still is.

 Below are the agenda to be discussed in this article.

- A default/fallback password is the password, isn’t it?

- Convenience is doubled-edged

- Spoofing and Liveness-Detection

- Is the password weaker than biometrics?

- Is biometrics-only authentication achievable?

-What can we gain from bringing in biometrics into multi-factor authentication?

- Intermezzo: Entertaining Security Parodies

- Haven’t the biometrics promoters built a huge sandcastle?

- This false sense of security has been benefiting criminals, hasn’t it?

- This false sense of security has only been benefiting criminals, hasn’t it?

- Hey, Biometrics Guys! Get Provoked!

- Conclusion: The password is insufficient, but not harmful. Biometrics is harmful, and not sufficient. Attempting to make quick money by spreading a false sense of security is ethically dubious and practically suicidal.

Update on 9/Feb/2020

A default/fallback password is the password, isn’t it?

 Let us infer what biometrics promoters and adopters would assert in order to justify their allegation that biometrics, while depending on the password, can displace the password.

 It could be "We are aware that consumers have to rely on a default password as the fallback measure in case of false rejection. But, the consumers can complete the authentication without using the password/pincode when they are not rejected by the biometrics. This observation encourages us to assert that biometrics enables us to achieve a password/pincode-less authentication while providing good convenience to citizens".

 What they would not mention is "We are not interested to talk about the reality that the adoption of biometrics has enabled criminals to capitalize on the two entrances placed in a 'multi-entrance' deployment which has brought down security to the level lower than a password/pincode-only authentication. Convenience that we offer actually benefits criminals."

 Convenience is doubled-edged

 Biometrics promoters have persuaded us into believing that nothing is more convenient than putting your finger on a device or looking into a camera. They do not tell what is behind this convenience - security was brought down to the level lower than a password/pincode only authentication as demonstrated in this 2-minute video - https://youtu.be/wuhB5vxKYlg

 Good convenience offered to citizens is often the same as the lowered security offered to criminals. We should note here that criminals' motivation to look for good convenience (=lowered security) is probably far greater than citizen's motivation to enjoy good convenience. We should also bear in mind that this kind of convenience could bring a huge inconvenience; Imagine what sort of inconvenience the victims of security breach would have to suffer.

There is no problem in a convenience-first product being declared as a convenience-first product, but it is ethically wrong if a convenient-first product is disguised as a security-first product.

The structure is so simple and plain. It is a conundrum how come reputed banks and other leading service providers have been so indifferent to such simple and plain facts.

Spoofing and Liveness-Detection

 You might have heard about what happened to the latest smartphones with fingerprints scan - https://www.forbes.com/sites/daveywinder/2019/11/02/smartphone-security-alert-as-hackers-claim-any-fingerprint-lock-broken-in-20-minutes/

 In view of such big biometrics incidents, ‘Liveness-Detection’ touted as a counter-spoofing measure is reportedly a hot topic now among certain biometrics people. It is not worth it. 

 Liveness-detection is sometimes discussed as if it were a second layer of security. It is not the case. Body features of living animals are variable. What would the user be expected to do if they got wrongly rejected by the liveness detection? Give up the login altogether? If something else is brought in as a fallback measure, it means that the liveness detection works as a second entrance, not a second layer. 

All the counter-spoofing measures including liveness detection is no more than a factor of increasing the False Rejection/Non-Match (FR/FN) rates while possibly contributing to the reduction of False Acceptance/Match (FA/FM) rates. A gain grasped in the right hand could possibly be dropping from the left hand, although it is not possible to quantitatively examine this effect until the specific liveness detection is put to the empirical tests in both indoor and outdoor environments.

 Liveness detection has been known to us over 15 year. It was first a built-in thermometer and an infra-red sensing to measure the warm temperature of genuine or spoofed hands, fingers and faces. We were not surprised to hear that those were fooled within hours by curious students who started to warm the spoofed objects. Sensing the presence of heartbeats was also defeated very quickly by smart students. Motion-detection beaten by video as well. We will see what will happen next between the ‘advanced liveness detection’ and the ever inquisitive students.

No alt text provided for this image

Moreover, even if someone comes up with a perfect liveness detection technology, it would solve just one aspect of the spoofing problem. There may still be the spoofing for which liveness detection may not be relevant. And, even if someone comes up with a perfect solution to eliminate the spoofing altogether, biometrics still has the fundamental problem of having the trade-off relation between FM/FA and FNM/FR due to the nature of body features inherent in living animals.

No alt text provided for this image

The trade-off relation of FM/FA and FNM/FR inevitably brings this security problem – “Early models of smartphones were safer than newer models - How come? “ – https://www.dhirubhai.net/pulse/early-models-smartphones-were-safer-than-newer-how-come-kokumai

 Is the password weaker than biometrics?

 It is not feasible to compare a biometrics on its own, which is probabilistic, with a password on its own, which is deterministic. And, in reality, how can we select the test samples to compare from among numerous possible combinations, say, between the two extremes of ‘the securest password vs the least accurate biometrics’ and ‘the poorest password vs the most accurate biometrics’?

 If we hear someone speaking that biometrics is more secure than passwords, we should doubt their integrity.

No alt text provided for this image

 On the other hand, it is feasible and logically correct to compare (1) a password with (2) a biometrics with the same password as a fallback measure against false rejection/non-match of the biometrics. Logic leads us to conclude that (2) is inevitably weaker than (1).

Is biometrics-only authentication achievable?

 If taken narrowly and literally, 'biometrics-only authentication' could bring such tragedies as reported in India and examined in this article - "Unnecessary Deaths Presumably Brought By Biometrics Misunderstood" - https://www.valuewalk.com/2018/02/biometrics-aadhaar-danger/


No alt text provided for this image

 It also brings a 1984-like Dystopia. Democracy is dead where our identity is authenticated without having our will/volition confirmed.


If taken broadly and ambiguously as 'biometrics-only authentication that is backed up by a default/fallback password/pincode', it only brings security down to the level lower than a password/pincode-only authentication as analyzed in the above video and in this article - "Early models of smartphones were safer than newer models - How come?"

What can we gain from bringing in biometrics into multi-factor authentication?

 A password and a physical token can be used on its own and also used as a second layer in 'multi-layer' deployment, whereas biometrics cannot be used on its own but must always be used with another authenticator in 'multi-entrance' deployment.

 This means that biometrics cannot be a factor of the true multi-factor authentication that is supposed to be deployed in a security-enhancing 'multi-layer' method. Biometrics-involved multi-factor authentications would inevitably bring down the security that could otherwise be maintained.

No alt text provided for this image

We ought to be very careful about what security professionals tell us. Many of them are ignorant of or indifferent to the opposite security effects of two authenticators used in 'multi-layer' and 'multi-entrance' deployments – “Quantitative Examination of Multiple Authenticator Deployment” -

 We often hear professionals say that we should not make a ruling on biometrics by looking at its current performance but we should take it into account that biometrics technologies is improving.

 What would you say if you hear pharmaceutical companies stating "We recommend this drug for your healthier life. At present this drug is harmful to your health but we expect that it will evolve to become really effective sometime in the future. So please take this drug now"?

  ++++++++++++++++++++++++++++++++++++++++++++++++++++++

Intermezzo: Entertaining Security Parodies

Current foot brakes are far from sufficient in the slip distance. This means that the foot brake system is dangerous. We have now removed the dangerous foot brake system from the cars we sell. We instead offer the safer cars that are equipped with better steering handles, better acceleration pedals and better hand brakes.

No alt text provided for this image

Physical keys are often stolen, copied and abused. This means that the lock/key system is dangerous. We have now removed the dangerous lock/key system from the houses that we sell. We instead protect our houses by making the door panels thicker and heavier

 Passwords are often stolen, leaked and abused. This means that the password system is dangerous. We have now removed the dangerous password system from digital identity. We now protect the digital identity of our clients by offering the safer combinations of ‘physical tokens and biometrics’ instead of the dangerous combinations of ‘passwords’, ‘physical tokens’ and ‘biometrics’.

No alt text provided for this image

 A house with two entrances provides better security against burglars than a house with one entrance. We suggest the owners of one-entrance houses to place an extra entrance for better security in the regions where we do not have to care about the definition of ‘better’ or for whom it is ‘better’.

Biometrics, when used as an authenticator in cyber space, needs to be deployed in ‘multi-entrance’ method with a password/PIN as a fallback measure against false rejection. We now offer the password/PIN-dependent biometrics that provides better security than the password?-alone authentication. Our proposition is viewed as valid where they do not ask the definition of ‘better’ or for whom it is ‘better’.


No alt text provided for this image

 A paper knife (specific/subordinate concept) belongs to the knife (general/superordinate concept). Therefore, a paper knife must be able to perform what the knife is unable to perform.

A PIN, which is a weak form of numbers-only password, belongs to the password. A PIN (specific/subordinate) must be able to offer the high level security that the password (general/superordinate) is unable to offer, possibly in a cyber version of Alice’s Wonderland.

 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

 Haven’t the biometrics promoters built a huge sandcastle?

 Biometrics is said to be growing to be a gigantic business as reported here - Biometrics research notes: banking, systems, Asian retail and smart tickets - https://www.biometricupdate.com/201910/biometrics-research-notes-banking-systems-asian-retail-and-smart-tickets

 It reads "Biometrics systems will generate over $65B by 2024, according to new research, with growth in different areas for different regions. Signs are also positive for the industry in banking and securities, Asian retail, and smart ticketing, with significant investments anticipated in each."

 The figure of $65 billion is really mind-boggling even if it is bloated 10 times! Then, it should be extremely exciting to imagine what will happen when the myths of biometrics as examined above get debunked in front of the public and the gigantic castle of biometrics proves to have actually been a sandcastle. We might well be watching a huge vacuum generated where there was the gigantic sandcastle.

 This false sense of security has only been benefiting criminals, hasn’t it?

 As examined above, biometrics has continuously contributed to providing a favorable environment to criminals, not to citizens, for nearly two decades and the public has been misled to believe that biometrics has provided better security for citizens. This false sense of security might well keep causing huge damages on our societal life for many more years unless somebody speaks out articulately.

No alt text provided for this image

 Over several years we have repeatedly made clear that biometrics brings down security to the level lower than a password-only authentication where it is used together with a password in a ‘multi-entrance’ deployment, as against a “multi-layer” deployment.

 We have received not a single logical or evidence-based refutation, which led us to suspect that the biometrics guys love a one-way propaganda but hate the exchange of opinions.

 They might be prepared to allow people to debate on ‘spoofing’ and ‘data leak’, because they could counter these debates by talking about the eternal endeavor of improving technologies. But it looks like they are aware they cannot afford to be involved in the discussion on the negative security effect of biometrics used with a 'fallback password’ required against false rejection/non-match, presumably because there is absolutely no way of eliminating the presence of trade-off relation between false match/acceptance and false non-match/rejection due to the nature of the body features inherent in living animals.

 In other words, it looks as though they are afraid that, should they publicly admit the necessity and actual presence of 'fallback measure', a default password/pincode in most cases, the very foundation of their decades-long allegation of “Biometrics brings better security than passwords” would evaporate right away.

 As such we are led to suspect that all that the biometrics guys can do is turn a blind eye, cover their ear, close their mouth and keep earning as much quick money as possible before their 'business model' collapses.

 Incidentally, we are also very worried to have noticed that biometrics data is seldom publicized in a logical and scientific manner.

 Quite a few biometrics vendors publicize a part of a fact and do not disclose the other part of the fact, for instance, publicizing a nicely low false match/acceptance rate without saying anything about the corresponding false non-match/rejection rate, which could be alarmingly high, but remains unknown to the public.

 Subsequently, this phenomenon comes with their silence on the need and presence of a fallback password/pincode against the false non-match/rejection, which brings down security to the level lower than password/pincode-only authentication, as repeatedly made clear in this article.

 Moreover, we could add that unsubstantiated theoretical data is often presented as if it were the objective empirical data.

 Hey, Biometrics Guys! Get Provoked!

 By ‘biometrics guys,’ we mean not just the biometrics vendors but those officials, professionals, researchers, consultants, journalists, etc. who have gained a lot from this dubious way of doing business.

 Biometrics Guys! At the early days, you were probably just ignorant of the security-lowering effect of biometrics used with a fallback password, presumably because you were indifferent to and unaware of the opposite security effect of two authenticators used together in a security-enhancing 'multi-layer' deployment and in a security-lowering 'multi-entrance' deployment.


No alt text provided for this image

 Now, seeing so many people genuinely misbelieve that they are protected by higher security of biometrics, you might well be muttering to yourself "It is just too inconvenient and embarrassing to admit the fact".


Biometrics Guys! Should you be confident that we are mistaken somewhere in this article, you would be welcomed to refute specifically where you reckon we are wrong.

 Conclusion

 The password is insufficient, but not harmful.

 Biometrics is harmful, and not sufficient. 

 Attempting to make quick money by spreading a false sense of security is ethically dubious and practically suicidal.


< Video Interview by Risk Group LLC >

 Risk Roundup | Episode #222 | Expanded Password System 

< Related Article >

For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)

What We Know for Certain about Authentication Factors

Proposition on How to Build Sustainable Digital Identity Platform

Update: Questions and Answers - Expanded Password System and Related Issues

Update - History, Current Status and Future Scenarios of Expanded Password System

#identity #authentication #password #security #biometrics #ethic #privacy #democracy #finance #FDATAsummit2019

< Update on 12/Feb/2020 >

What actually tells ‘probabilistic authenticator’ and ‘deterministic authenticator’ apart?

 Some people appear to be led to assume that there are a FAR and an FRR with any means of authentication. I am afraid that they are misguided.

 ‘Acceptance and Rejection’ of a deterministic tool (Yes or No on remembrance of a correct password and Yes or No on possession of a correct physical token) is one thing, that of a probabilistic tool (biometrics to measure unpredictably variable body features) is another.

 As a matter of fact, a password and a physical token can be and are actually used together in a security-enhancing ‘multi-layer’ deployment because these are both deterministic, whereas biometrics and password/token can be and are actually used together only in a security-lowering ‘multi-entrance’ deployment because biometrics is probabilistic. Mixing up those fundamentally different subjects would be very misleading.

 The analysis of biometrics being probabilistic leads us to the next observation that 'biometrics-only authentication' could exist only on paper, because the users who get rejected due to the unpredictable false rejection would have only choice of giving up the login altogether. It cannot be allowed in our real life.

Cult of Convenience

It is natural for us to be thankful to the people who came up with the means to safely get the job done in one day that used to take weeks or months to do unsafely. 

 Who could be thankful to the people who come up with the means to unsafely get the job done in 5 seconds that used to take 10 seconds to do safely? If any, we could call them ‘Cult of Convenience’. Such a behavior could be viewed as ‘time-saving obsession syndrome’. Actually, we know there are many of them in the sphere of cybersecurity and identity management.

 Putting a finger on a sensor or holding a smartphone in front of our face may look a bit more ‘time-saving’ as compared with feeding numbers and characters, This ‘time-saving’ effect is obtained, however, by taking the risk of a huge inconvenience or time-wasting trouble in case of the leakage of the body feature data. 

 The cult of convenience would not care. For them, the few seconds thus saved is worth the grave risk of leakage of the privacy data that people can never cancel, change or re-generate for life.

 And, alas, all this happens on top of the fact that the use of biometrics brings down security to the level lower than a PIN/password-only login.

What on earth are we doing?

Daniel Kwadwo Akomea-Agyin

Author | Entrepreneur | Evangelist | Deep thinker | Activator | Maximize-Your-Potential Advocate

4 年

Very insightful and a powerful delivery. Password + Physical tokens = deterministic and highly secured, being used by security aware/concious organizations. Password + Biometrics = probabilistic , less secured, and targeted at the less-informed consumer who sees it fashionable to look at a phone or touch a sensor and make it obey him/her by granting them access. It will be sometime before such consumers are brought to the other side of the security-convinience continuum. I suppose this advocacy should be targeted more at organizations and businesses to get them thinking about how to REALLY protect their houses with a deterministic multi-layer protection system. Thanks Hitoshi!

Antoine Lawandos

?AGM CIO at BLOM BANK ?Strategic Thinker ?Solutions Architect ?Innovation Tinkerer ?CORE Banking?Digital Transformation

4 年

Continue spreading awareness because techillusionists will continue to spread false sense of everything including of security. Techillusionists only care for their short term self centred interests, they are not driven by ethics you ask about in your post, they will try to mislead anyone if this can help them achieve their sales quota for the quarter

回复
Hitoshi Kokumai

Advocate of Identity Assurance by Citizens' Volition and Memory. Founder and Chief Architect at Mnemonic Identity Solutions Limited

5 年

It is really a pity that those people at 'Cult of Convenience' would escape the discussions and run away into silence about the grave outcome of the security-lowering products disguised as the security-enhancing products by way of getting 'multi-entrance' deployment disguised as 'multi-layer' deployment. Unless they come out of the silence, we would have to conclude that they are simply unable to face the reality because they have got too many people to spend too much money for making people's life less safe through their ethically dubious business model.

回复
Debesh Choudhury, PhD

Information Security Researcher, Academician, Entrepreneur | Password & Cybersecurity, Digital Identity, Biometrics Limit, 3D Education | Linux Trainer | Writer | Podcast Host

5 年

Like the update of 09 Feb 2020 on "Probabilistic versus deterministic" authenticator?Hitoshi Kokumai?.. That explanation helps to understand why biometrics (a probabilistic authenticator) is less reliable than a text password (a deterministic authenticator).

John Marrett

Helping mid-sized organizations increase sales and improve customer service since 1993 | #LinkedInLocal

5 年

The most important lesson Hitoshi Kokumai: There is no problem in a convenience-first product being declared as a convenience-first product, but it is ethically wrong if a convenient-first product is disguised as a security-first product.

要查看或添加评论,请登录

Hitoshi Kokumai的更多文章

社区洞察

其他会员也浏览了