• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 23:38
CEST 05:38
KST 12:38
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
[ASL19] Finals Recap: Standing Tall5HomeStory Cup 27 - Info & Preview18Classic wins Code S Season 2 (2025)16Code S RO4 & Finals Preview: herO, Rogue, Classic, GuMiho0TL Team Map Contest #5: Presented by Monster Energy6
Community News
Flash Announces Hiatus From ASL40Weekly Cups (June 23-29): Reynor in world title form?12FEL Cracov 2025 (July 27) - $8000 live event16Esports World Cup 2025 - Final Player Roster14Weekly Cups (June 16-22): Clem strikes back1
StarCraft 2
General
Statistics for vetoed/disliked maps The SCII GOAT: A statistical Evaluation Weekly Cups (June 23-29): Reynor in world title form? StarCraft Mass Recall: SC1 campaigns on SC2 thread How does the number of casters affect your enjoyment of esports?
Tourneys
[GSL 2025] Code S: Season 2 - Semi Finals & Finals $5,100+ SEL Season 2 Championship (SC: Evo) FEL Cracov 2025 (July 27) - $8000 live event HomeStory Cup 27 (June 27-29) WardiTV Mondays
Strategy
How did i lose this ZvP, whats the proper response Simple Questions Simple Answers
Custom Maps
[UMS] Zillion Zerglings
External Content
Mutation # 480 Moths to the Flame Mutation # 479 Worn Out Welcome Mutation # 478 Instant Karma Mutation # 477 Slow and Steady
Brood War
General
Flash Announces Hiatus From ASL Help: rep cant save BGH Auto Balance -> http://bghmmr.eu/ [ASL19] Finals Recap: Standing Tall Where did Hovz go?
Tourneys
[Megathread] Daily Proleagues [BSL20] GosuLeague RO16 - Tue & Wed 20:00+CET The Casual Games of the Week Thread [BSL20] ProLeague LB Final - Saturday 20:00 CET
Strategy
Simple Questions, Simple Answers I am doing this better than progamers do.
Other Games
General Games
Stormgate/Frost Giant Megathread Nintendo Switch Thread Path of Exile What do you want from future RTS games? Beyond All Reason
Dota 2
Official 'what is Dota anymore' discussion
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Heroes of StarCraft mini-set
TL Mafia
TL Mafia Community Thread Vanilla Mini Mafia
Community
General
Trading/Investing Thread US Politics Mega-thread Things Aren’t Peaceful in Palestine The Games Industry And ATVI Stop Killing Games - European Citizens Initiative
Fan Clubs
SKT1 Classic Fan Club! Maru Fan Club
Media & Entertainment
Anime Discussion Thread [Manga] One Piece [\m/] Heavy Metal Thread Korean Music Discussion
Sports
2024 - 2025 Football Thread NBA General Discussion Formula 1 Discussion TeamLiquid Health and Fitness Initiative For 2023 NHL Playoffs 2024
World Cup 2022
Tech Support
Computer Build, Upgrade & Buying Resource Thread
TL Community
The Automated Ban List
Blogs
from making sc maps to makin…
Husyelt
Blog #2
tankgirl
Game Sound vs. Music: The Im…
TrAiDoS
StarCraft improvement
iopq
Heero Yuy & the Tax…
KrillinFromwales
Trip to the Zoo
micronesia
Customize Sidebar...

Website Feedback

Closed Threads



Active: 533 users

Fingerprints for Passwords

Blogs > micronesia
Post a Reply
Normal
micronesia
Profile Blog Joined July 2006
United States24665 Posts
April 16 2014 11:25 GMT
#1
I was reading this which got me thinking about the idea of having our devices scan our fingerprints (or other biometrics) not just for logging into your device, but also for use as online passwords. I don't understand the details of how this will work, at all. However, this seems like a terrible idea (and one that several big companies seem to be behind).

As things stand, a silly mistake on my end, or a security breach online, can result in crackers/hackers getting some of my passwords. Once they have them, they can log into any services I have where they know both the username and the password (some services have multiple layers of protection, though). If logging into say, paypal, required me to scan my fingerprint on a device attached to my computer, it might seem to make it much more difficult for a malicious user to gain access to my account since it's easier to enter in a stolen password than it is to enter in a stolen fingerprint.

However, sooner or later, someone on our side (innocent people) is going to screw up somewhere and bad people will get access to the data that is sent from our fingerprint reader to a login page, and they will now have the digital equivalent of your fingerprint. They can then replicate it and use your digital fingerprint to log into other services you have an account with, as well. This creates two problems:

  1. You are essentially using the same password for every website now, your fingerprint, instead of a variety of works/phrases, so this cracker/hacker can get access to almost anything.
  2. You can't simply change your password once you receive word of a security breach like everyone is doing with heartbleed... you only have one set of fingerprints (except for Will Smith in MiB perhaps)


I'm sure some of the people involved in the development of using fingerprints for passwords have given this some though, and have some answers. But it seems to me like the core issues will still be there, and this won't really be any better for us than our current password and identity validation system.

***
ModeratorThere are animal crackers for people and there are people crackers for animals.
Kleinmuuhg
Profile Blog Joined September 2010
Vanuatu4091 Posts
April 16 2014 11:46 GMT
#2
This seems to go in the same direction as when parents had gps chips implanted in their kids finger which resulted in kids getting their fingers cut off when they were kidnapped.
This is our town, scrub
Omnishroud
Profile Blog Joined November 2013
1073 Posts
April 16 2014 12:45 GMT
#3
On April 16 2014 20:46 Kleinmuuhg wrote:
This seems to go in the same direction as when parents had gps chips implanted in their kids finger which resulted in kids getting their fingers cut off when they were kidnapped.


What the fuck. I never heard of this. Thats sick.

And yes fingerprints for passwords is a stupid idea, there are just too many ways of gaining that information or replicating it.
Omni = Capped (RIP TL Account) - LoL EUW: Capped92 - EU Bnet: Capped#1137 - Steam: Capped92
Logo
Profile Blog Joined April 2010
United States7542 Posts
Last Edited: 2014-04-16 12:49:46
April 16 2014 12:46 GMT
#4
I believe most credible security experts are against biometric passwords for those very reasons. At best a fingerprint seems like it'd be a viable replacement for something like an RSA token (think the blizz authenticator) in cases where you want some extra security, but not enough to hand out an RSA dongle to everyone. In that case your fingerprint is the "something you have" part of the security, but something you know is still required for account access.

A third problem not mentioned is it's a bit discriminatory against people who can't use their hands (either because they don't have them or due to other conditions that reduce motor skills).

Uh also people who have recently lost limbs may find themselves locked out of their accounts. Even a big enough scar on a finger could do it.
Logo
Pandemona *
Profile Blog Joined March 2011
Charlie Sheens House51480 Posts
April 16 2014 13:47 GMT
#5
Well i read this last night.

http://timesofindia.indiatimes.com/tech/mobiles/Galaxy-S5-fingerprint-scanner-hacked-with-ease/articleshow/33805220.cms

I have an S5 being delivered today (well it's arrived but im at work and it is at home) so it will be interesting to see how that works, but the Germans already hacked it by faking a finger touch which lets u in. So these scanners need alot of work already xD
ModeratorTeam Liquid Football Thread Guru! - Chelsea FC ♥
beef42
Profile Blog Joined October 2008
Denmark1037 Posts
Last Edited: 2014-04-16 14:10:31
April 16 2014 14:09 GMT
#6
meh you wrote this disregard
Yorbon
Profile Joined December 2011
Netherlands4272 Posts
April 16 2014 14:11 GMT
#7
Seems like a bad idea indeed ><
AnachronisticAnarchy
Profile Blog Joined July 2011
United States2957 Posts
Last Edited: 2014-04-16 14:36:15
April 16 2014 14:35 GMT
#8
Fingerprint scanners only work in person. Over the internet they're actually worse than standard passwords. It's just too easy to send a fake fingerprint.
"How are you?" "I am fine, because it is not normal to scream in pain."
ThomasjServo
Profile Blog Joined May 2012
15244 Posts
Last Edited: 2014-04-16 15:02:10
April 16 2014 15:01 GMT
#9
I always thought this would be awesome for Passports, complimented with some type of security questions, but much beyond that it seems limited. No one is going to walk into an airport with a severed finger.

There is also the whole issue of having that kind of information on record with governments which I wouldn't care to delve into.
Advocado
Profile Blog Joined September 2010
Denmark994 Posts
April 16 2014 15:10 GMT
#10
I work at a University It department and we have had laptops which you can log into with fingerprint scanners. Unfortunately the fingerprint technology is too poor for it to useful. You can attempt multiple times and basically lick your finger to use the wetness to access a machine that is not yours.

If the technology becomes better it still has all these problems you wrote about:
1. Having the same password everywhere is a very bad idea as you stated. An IT department will have multiple user accounts to prevent abuse of all them if one becomes "cracked" by a malicious user.
2. Forced password changes are a integral part of IT security.

Possibly you could integrate something like fingerprint scanners with an authenticator token (think battle.net Token) but that still leaves the problem of you having an account, that cannot change your password for. Come to think of it the IRIS scanners probably will face the same challenges, if it wants to become the defacto standard and not just an additition to normal account security.

For the moment passwords are here to stay it seems.
http://www.twitch.tv/advocadosc2
Alzadar
Profile Blog Joined April 2010
Canada5009 Posts
April 16 2014 16:18 GMT
#11
Using a fingerprint as a password is ultimately little different from having a very complex password that you carry around with you (tattooed on your chest maybe). I don't see the appeal at all, other than increasing the complexity of the typical password (is this really a concern? how often are security breaches due to password guessing?).
I am the Town Medic.
ThomasjServo
Profile Blog Joined May 2012
15244 Posts
Last Edited: 2014-04-16 16:29:13
April 16 2014 16:28 GMT
#12
On April 17 2014 01:18 Alzadar wrote:
Using a fingerprint as a password is ultimately little different from having a very complex password that you carry around with you (tattooed on your chest maybe). I don't see the appeal at all, other than increasing the complexity of the typical password (is this really a concern? how often are security breaches due to password guessing?).

Brute force is a still a very common method of obtaining data, generally it is a weakest link kind of thing. If you have valuable data, someone, somewhere on your network has a password that is six characters and all alphanumeric with no special characters.
Alzadar
Profile Blog Joined April 2010
Canada5009 Posts
April 16 2014 17:56 GMT
#13
On April 17 2014 01:28 ThomasjServo wrote:
Show nested quote +
On April 17 2014 01:18 Alzadar wrote:
Using a fingerprint as a password is ultimately little different from having a very complex password that you carry around with you (tattooed on your chest maybe). I don't see the appeal at all, other than increasing the complexity of the typical password (is this really a concern? how often are security breaches due to password guessing?).

Brute force is a still a very common method of obtaining data, generally it is a weakest link kind of thing. If you have valuable data, someone, somewhere on your network has a password that is six characters and all alphanumeric with no special characters.


Can't you only brute force effectively if you have some other breach (stolen password hashes)? Most online systems don't allow unlimited password attempts.
I am the Town Medic.
Djzapz
Profile Blog Joined August 2009
Canada10681 Posts
April 16 2014 18:35 GMT
#14
You could have 10 passwords though! That's more than the 4-5 I use... Plus I could imagine a system where you'd log in by inputting your fingerprint AND doing a little motion on the sensor, like an X of a squiggly line or something like that.

That said, I don't mind typing in passwords.
"My incompetence with power tools had been increasing exponentially over the course of 20 years spent inhaling experimental oven cleaners"
vult
Profile Blog Joined February 2012
United States9400 Posts
April 16 2014 18:39 GMT
#15
I have 7-8 passwords that I rotate on all my accounts every 4-6 months, and I have different passwords on all my accounts.

Then again, I have been hacked and had issues with security in the past so I am a little paranoid XD
I used to play random, but for you I play very specifically.
ThomasjServo
Profile Blog Joined May 2012
15244 Posts
April 16 2014 18:54 GMT
#16
On April 17 2014 02:56 Alzadar wrote:
Show nested quote +
On April 17 2014 01:28 ThomasjServo wrote:
On April 17 2014 01:18 Alzadar wrote:
Using a fingerprint as a password is ultimately little different from having a very complex password that you carry around with you (tattooed on your chest maybe). I don't see the appeal at all, other than increasing the complexity of the typical password (is this really a concern? how often are security breaches due to password guessing?).

Brute force is a still a very common method of obtaining data, generally it is a weakest link kind of thing. If you have valuable data, someone, somewhere on your network has a password that is six characters and all alphanumeric with no special characters.


Can't you only brute force effectively if you have some other breach (stolen password hashes)? Most online systems don't allow unlimited password attempts.


At certain points of course, but the top comment in an /r/askreddit thread today sums up the actual inner workings of most systems nicely. But even for putting in credit card information there are points where systems won't try to stop what is being put in, not all of course but not everyone uses Gmail, or comparatively up to date services.


"Hackers" of Reddit, what are some cool/scary things about our technology that aren't necessarily public knowledge? [Serious]
As someone who has programmed since the late 80's the scariest thing is just how flaky everything is.
It's turtles all the way down except the turtles are horribly written unmaintained code that no-one commented and the guy who wrote it left the company 5 years ago to take up yak farming.
Our entire modern economy and to some extent society is entirely dependent on systems that where written by people like me.
That is fucking terrifying.


My favorite analogy is how a lot of these systems are like a severely overload surge protector once you're in.

That is kind of what I am getting at with the weakest link in your company or network. The vast majority of people that are trying to obtain valuable information do so in surprisingly simple ways, like calling you and pretending to be a CSR for a major corporation, send mass emails from domains like @Bestbuy.biz.com (some peoples spam filters still don't catch these, I hear about them daily), or even text messages sent out to almost any phone number that will take it.

Get a rube to volunteer information, and use it in every way you can think of. Email/Password combinations, how many sites can this work on? What information can I get at, can I translate it into more money for the time I am investing in using your information. It all ties in nicely with social media literacy.
LaNague
Profile Blog Joined April 2010
Germany9118 Posts
Last Edited: 2014-04-16 19:44:56
April 16 2014 19:44 GMT
#17
The big problem is people reusing passwords (i do it too), because you have a bazillion different services you need, and then those sites managing to lose all their account data to criminals.

fingerprints actually dont help with that, they just create longer passwords and unless you need them NSA-proof, 2 or 3 normal words put together is allready save.

im not even using much stuff and i allready had 3 companies lose my data. Cant really blame all internet users when a multibillion dollar company like sony is losing a few hundred thousand client accounts inclusing billing information.
That should be fixed first and companies should be held responsible for the damage they caused. Right now, they just write a mail with "oopsie, we lost your account data, please change your password. And oh, if someone is using your bank account, that might be on us, but good luck proving that in court".
They need some monetray incentive to not have their interns manage account security.

then noone gets my important passwords and i dont have to remember 20 different ones in the first place.
Deleuze
Profile Blog Joined December 2010
United Kingdom2102 Posts
April 16 2014 20:46 GMT
#18
I have a habit of not leaving my passwords lying around on every surface I happen to touch.
“An image of thought called philosophy has been formed historically and it effectively stops people from thinking.” ― Gilles Deleuze, Dialogues II
ThomasjServo
Profile Blog Joined May 2012
15244 Posts
April 16 2014 21:30 GMT
#19
On April 17 2014 05:46 Deleuze wrote:
I have a habit of not leaving my passwords lying around on every surface I happen to touch.

You're strange. By the way, my name is ThomasjServo and I am a part of the new BT forum interaction team. Due to a complication with a payment processor and to ensure the on going, positive state of your account, I need to verify your log in information via personal message on this site.
felisconcolori
Profile Blog Joined October 2011
United States6168 Posts
April 17 2014 11:50 GMT
#20
On April 17 2014 02:56 Alzadar wrote:
Show nested quote +
On April 17 2014 01:28 ThomasjServo wrote:
On April 17 2014 01:18 Alzadar wrote:
Using a fingerprint as a password is ultimately little different from having a very complex password that you carry around with you (tattooed on your chest maybe). I don't see the appeal at all, other than increasing the complexity of the typical password (is this really a concern? how often are security breaches due to password guessing?).

Brute force is a still a very common method of obtaining data, generally it is a weakest link kind of thing. If you have valuable data, someone, somewhere on your network has a password that is six characters and all alphanumeric with no special characters.


Can't you only brute force effectively if you have some other breach (stolen password hashes)? Most online systems don't allow unlimited password attempts.


If your data is sensitive enough, there's a different definition of "brute force" that may apply...

http://xkcd.com/538/
Yes, I email sponsors... to thank them. Don't post drunk, kids. My king, what has become of you?
Tephus
Profile Joined May 2011
Cascadia1753 Posts
April 17 2014 19:18 GMT
#21
In my opinion, most biometrics should at most be used as an identifier, like your username, and not as password. Identifiers are things only you are, passwords should be things only you know.
AdministratorDirector of Esports
Zess
Profile Joined July 2012
Adun Toridas!9144 Posts
April 17 2014 22:24 GMT
#22
On April 16 2014 20:25 micronesia wrote:
I'm sure some of the people involved in the development of using fingerprints for passwords have given this some though, and have some answers. But it seems to me like the core issues will still be there, and this won't really be any better for us than our current password and identity validation system.


The issue with stealing physical fingerprints is a real one (and is why using your fingerprint to lock your iPhone is great against burglars but terrible against the police, although miles better than a terrible 4 digit numeric code).

However, the fear that a security breach on one site that you authenticate with will leak your password to all other sites is in fact mitigated with the suggested fingerprint technology. Currently, most websites use a salted one way hash to store your password, so that given a password, you can generate a unique key, but given a unique key, it is very hard to find the password (unless your password sucks). But even so, breaking into the server and obtaining the hash still obtains relevant information about the password.

Fingerprint technology paired with a scanning device allows us to use "zero-knowledge" authentication, which means the website will know that you know the password, but no one watching or peeping on this exchange will have any idea of what is going on, and couldn't tell the difference between a real handshake and a fake handshake. So ideally, there would be nothing that could be stolen on the server side that will log you into other servers with their own authentication scheme. http://en.wikipedia.org/wiki/Zero_knowledge_proof#Abstract_example
Administrator@TL_Zess
| (• ◡•)|八 (❍ᴥ❍ʋ)
darkscream
Profile Blog Joined December 2010
Canada2310 Posts
April 18 2014 13:37 GMT
#23
Biometrics as the main access key to anything is not the way to go for any service and pursuing them is the path of tyranny.

First of all, its imperfect, your body will be stolen or reproduced. Does not require "you", which is the intent, but its not a wizard's spell from dungeons and dragons, magic doesnt exist

secondly, we're already monitored and measured by governments and corporations all day every day, a secure code in your head for a closed (non internet) network is safest and will always be closest to a vault with complex physical key system. Tying it to your body means everyone knows what your key looks like and where you keep it.

Really it just seems shortsighted at best, tinfoil-hat conspiratorial at worst. I'm sure it's appropriate as a layer or in some specific security circumstances, but holy shit it just does not seem to be a good idea in this day and age, to login to your phone computer and social media with your biometrics on the open web/telephony system.
Normal
Please log in or register to reply.
Live Events Refresh
Replay Cast
00:00
HSC 27: Groups A & B
Liquipedia
OSC
20:00
Mid Season Playoffs
Gerald vs MojaLIVE!
ArT vs Jumy
Liquipedia
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
PiGStarcraft409
Nina 218
RuFF_SC2 170
NeuroSwarm 128
StarCraft: Brood War
PianO 198
Aegong 108
Sharp 67
Stork 58
Icarus 12
ajuk12(nOOB) 5
League of Legends
JimRising 757
Super Smash Bros
hungrybox721
Mew2King116
amsayoshi40
ChuDatz12
Heroes of the Storm
Khaldor123
Other Games
summit1g9750
tarik_tv1417
shahzam720
Maynarde123
WinterStarcraft105
Organizations
Other Games
gamesdonequick1380
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 18 non-featured ]
StarCraft 2
• Berry_CruncH264
• practicex 87
• Hupsaiya 46
• OhrlRock 3
• IndyKCrew
• AfreecaTV YouTube
• intothetv
• Kozan
• sooper7s
• LaughNgamezSOOP
• Migwel
StarCraft: Brood War
• RayReign 22
• Azhi_Dahaki14
• STPLYoutube
• ZZZeroYoutube
• BSLYoutube
League of Legends
• Doublelift5009
• Stunt166
Upcoming Events
The PondCast
6h 22m
RSL Revival
6h 22m
ByuN vs Classic
Clem vs Cham
WardiTV European League
12h 22m
Replay Cast
20h 22m
RSL Revival
1d 6h
herO vs SHIN
Reynor vs Cure
WardiTV European League
1d 12h
FEL
1d 12h
Korean StarCraft League
1d 23h
CranKy Ducklings
2 days
RSL Revival
2 days
[ Show More ]
FEL
2 days
Sparkling Tuna Cup
3 days
RSL Revival
3 days
FEL
3 days
BSL: ProLeague
3 days
Dewalt vs Bonyth
Replay Cast
4 days
Replay Cast
5 days
The PondCast
6 days
Replay Cast
6 days
Liquipedia Results

Completed

Proleague 2025-06-28
HSC XXVII
Heroes 10 EU

Ongoing

JPL Season 2
BSL 2v2 Season 3
BSL Season 20
Acropolis #3
KCM Race Survival 2025 Season 2
CSL 17: 2025 SUMMER
Copa Latinoamericana 4
Championship of Russia 2025
RSL Revival: Season 1
Murky Cup #2
BLAST.tv Austin Major 2025
ESL Impact League Season 7
IEM Dallas 2025
PGL Astana 2025
Asian Champions League '25
BLAST Rivals Spring 2025
MESA Nomadic Masters
CCT Season 2 Global Finals
IEM Melbourne 2025
YaLLa Compass Qatar 2025

Upcoming

CSLPRO Last Chance 2025
CSLPRO Chat StarLAN 3
K-Championship
uThermal 2v2 Main Event
SEL Season 2 Championship
FEL Cracov 2025
Esports World Cup 2025
StarSeries Fall 2025
FISSURE Playground #2
BLAST Open Fall 2025
BLAST Open Fall Qual
Esports World Cup 2025
BLAST Bounty Fall 2025
BLAST Bounty Fall Qual
IEM Cologne 2025
FISSURE Playground #1
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.