{"id":112,"date":"2005-03-29T10:47:00","date_gmt":"2005-03-29T10:47:00","guid":{"rendered":"http:\/\/markwilson.me.uk\/blog\/2005\/03\/biometric-security-good-or-bad.htm"},"modified":"2007-07-24T18:02:27","modified_gmt":"2007-07-24T17:02:27","slug":"biometric-security-good-or-bad","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/biometric-security-good-or-bad.htm","title":{"rendered":"Biometric security &#8211; good or bad?"},"content":{"rendered":"<p><!--111209325499714937-->There is much talk in the IT press about how we can no longer rely on single factor identification (e.g. user name and password) and about how biometric security could be at least part of the answer; but for an alternative take on just how dangerous an over-reliance on biometric security may be, Alistair Dabbs&#8217; recent <a href=\"http:\/\/www.itweek.co.uk\/comment\/1162020\">will biometric security harm users?<\/a> article in <a href=\"http:\/\/www.itweek.co.uk\/\">IT Week<\/a> provides an interesting, if a touch alarmist, view on how this could all end up as an identity fraud victim&#8217;s worst nightmare.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is much talk in the IT press about how we can no longer rely on single factor identification (e.g. user name and password) and about how biometric security could be at least part of the answer; but for an alternative take on just how dangerous an over-reliance on biometric security may be, Alistair Dabbs&#8217; &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/biometric-security-good-or-bad.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Biometric security &#8211; good or bad?<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[43],"class_list":["post-112","post","type-post","status-publish","format-standard","hentry","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Biometric security - good or bad? - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/biometric-security-good-or-bad.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biometric security - good or bad? - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"There is much talk in the IT press about how we can no longer rely on single factor identification (e.g. user name and password) and about how biometric security could be at least part of the answer; but for an alternative take on just how dangerous an over-reliance on biometric security may be, Alistair Dabbs&#8217; &hellip; Continue reading Biometric security &#8211; good or bad?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/biometric-security-good-or-bad.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2005-03-29T10:47:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2007-07-24T17:02:27+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/biometric-security-good-or-bad.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/biometric-security-good-or-bad.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"Biometric security &#8211; good or bad?\",\"datePublished\":\"2005-03-29T10:47:00+00:00\",\"dateModified\":\"2007-07-24T17:02:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/biometric-security-good-or-bad.htm\"},\"wordCount\":95,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/biometric-security-good-or-bad.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/biometric-security-good-or-bad.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/biometric-security-good-or-bad.htm\",\"name\":\"Biometric security - good or bad? - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2005-03-29T10:47:00+00:00\",\"dateModified\":\"2007-07-24T17:02:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/biometric-security-good-or-bad.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/biometric-security-good-or-bad.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/biometric-security-good-or-bad.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Biometric security &#8211; good or bad?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biometric security - good or bad? - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/biometric-security-good-or-bad.htm","og_locale":"en_GB","og_type":"article","og_title":"Biometric security - good or bad? - markwilson.it","og_description":"There is much talk in the IT press about how we can no longer rely on single factor identification (e.g. user name and password) and about how biometric security could be at least part of the answer; but for an alternative take on just how dangerous an over-reliance on biometric security may be, Alistair Dabbs&#8217; &hellip; Continue reading Biometric security &#8211; good or bad?","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/biometric-security-good-or-bad.htm","og_site_name":"markwilson.it","article_published_time":"2005-03-29T10:47:00+00:00","article_modified_time":"2007-07-24T17:02:27+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/biometric-security-good-or-bad.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/biometric-security-good-or-bad.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"Biometric security &#8211; good or bad?","datePublished":"2005-03-29T10:47:00+00:00","dateModified":"2007-07-24T17:02:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/biometric-security-good-or-bad.htm"},"wordCount":95,"commentCount":0,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/biometric-security-good-or-bad.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/biometric-security-good-or-bad.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/biometric-security-good-or-bad.htm","name":"Biometric security - good or bad? - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2005-03-29T10:47:00+00:00","dateModified":"2007-07-24T17:02:27+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/biometric-security-good-or-bad.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/biometric-security-good-or-bad.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/biometric-security-good-or-bad.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Biometric security &#8211; good or bad?"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":55,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/biometric-usb-flash-drive-how-cool-is.htm","url_meta":{"origin":112,"position":0},"title":"Biometric USB flash drive &#8211; how cool is that?!","author":"Mark Wilson","date":"Monday 7 February 2005","format":false,"excerpt":"I know that it is just a logical evolution of the humble USB flash drive and the decreasing cost of biometric security (even my local gym uses a fingerprint reader now for members to sign in and out) but last week Thomas Lee showed me the Trek ThumbDrive Swipe, which\u2026","rel":"","context":"In \"PC Hardware\"","block_context":{"text":"PC Hardware","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/pc-hardware"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6114,"url":"https:\/\/www.markwilson.co.uk\/blog\/2015\/11\/windows-hello.htm","url_meta":{"origin":112,"position":1},"title":"Banish passwords and unlock your PC with Windows Hello","author":"Mark Wilson","date":"Friday 13 November 2015","format":false,"excerpt":"Passwords are so old-fashioned. And insecure. Often,\u00a0after\u00a0a high profile website hack we're asked to change our passwords because most people use the same password for multiple services. So, what's the answer? Well, not using the same password for multiple sites might be one solution but that leads to problems with\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"Windows Hello setup - welcome!","src":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/images\/windows-hello-setup-1.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1988,"url":"https:\/\/www.markwilson.co.uk\/blog\/2010\/08\/what-features-would-you-like-to-see-in-windows-8.htm","url_meta":{"origin":112,"position":2},"title":"What features would you like to see in Windows 8?","author":"Mark Wilson","date":"Tuesday 17 August 2010","format":false,"excerpt":"Michael Pietroforte, of the 4sysops blog has teamed up with several prominant blog owners across the 'net to ask people what features they would like to see in Windows 8, which is expected to ship around 2012. As the poll is running on several websites (Demonic Talking Skull - msigeek\u2026","rel":"","context":"In \"Microsoft Windows 8\"","block_context":{"text":"Microsoft Windows 8","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/windows-8"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":392,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/06\/kerberos-authentication-explained.htm","url_meta":{"origin":112,"position":3},"title":"Kerberos authentication explained","author":"Mark Wilson","date":"Monday 6 June 2005","format":false,"excerpt":"Authentication and authorisation are often thought of as a single process but the two are actually distinct operations that may even use separate storage locations for the authentication and authorisation data. Authentication is about verifying identity, based on one or more factors, for example something that someone knows (e.g. a\u2026","rel":"","context":"In \"Security\"","block_context":{"text":"Security","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/security"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":541,"url":"https:\/\/www.markwilson.co.uk\/blog\/2006\/03\/publicprivate-key-cryptography-in.htm","url_meta":{"origin":112,"position":4},"title":"Public\/private key cryptography in plain(ish) English","author":"Mark Wilson","date":"Wednesday 22 March 2006","format":false,"excerpt":"Public key infrastructure (PKI) is one of those things that sounds like a good idea, but which I can never get my head around. It seems to involve so many terms to get to grips with and so, when Steve Lamb presented a \"plain English\" PKI session at Microsoft UK\u2026","rel":"","context":"In \"Security\"","block_context":{"text":"Security","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/security"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":7991,"url":"https:\/\/www.markwilson.co.uk\/blog\/2020\/05\/weeknote-22-2020-holidaying-on-the-costa-del-great-ouse-plus-password-resets-cycling-performance-video-conferencing-equipment-and-status-lights.htm","url_meta":{"origin":112,"position":5},"title":"Weeknote 22\/2020: holidaying on the Costa del Great Ouse (plus password resets, cycling performance, video-conferencing equipment and status lights)","author":"Mark Wilson","date":"Sunday 31 May 2020","format":false,"excerpt":"In the last few hours of 2019, my family planned our holiday. We thought we had it all sorted - fly to Barcelona, spend the weekend sight-seeing (including taking my football-mad son to Camp Nou) and then head up the coast for a few more days in the Costa Brava.\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/112","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=112"}],"version-history":[{"count":0,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/112\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=112"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=112"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=112"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}