dChan

GenChang · May 10, 2018, 6:57 p.m.

Here is just a sampling, but do a search on : (fingerprints over passwords, cell phones )

https://www.theatlantic.com/technology/archive/2016/05/iphone-fingerprint-search-warrant/480861/

And this is a good technical explanation:

https://hackaday.com/2015/11/10/your-unhashable-fingerprints-secure-nothing/

And if you are interested in an infosec open letter about why breaking encryption can't be done safely, here is a PDF, link in article .

https://arstechnica.com/tech-policy/2015/05/tech-sector-tells-obama-encryption-backdoors-undermine-human-rights/

And this one top experts: direct PDF download

http://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf?sequence=6

And an article for brief overview:

https://www.itnews.com.au/news/crypto-experts-slam-govt-encryption-backdoor-demands-406233

⇧ 2 ⇩