Tactics: The codes that hackers can not break (yet)

The hackers can not copy your tears! Still… Tears keep our eyes hydrated. They even have the power to "cure" us from an intense psychological charge. Can they protect our personal data on the Internet?

Stephen Mason, an Australian ophthalmologist, believes he has a very powerful weapon against hackers. He calls it the "world's first unique biometric pin" and it's basically a new mechanism that scans tears and then uses them as codes s.

tears hackers hackers hackers hackers

Mason dropped her weight in the cornea and less in the iris. This is the norm in optical scanners anyway, since hackers can't copy the unique way the eyes change every time they tear.

The scanner has the ability to recognize one , as each cornea has a kind of unique "map". THE Mason's, however, hopes to make life much more difficult for hackers. No matter how much they try to use the victim's details from the last time they logged into their account, the system will keep kicking them out. Why; Because since the eyes change every time they tear, so does the system expect the data to change slightly each time.

"The surface of the cornea is wet thanks to tears, so our data changes from one minute to the next," explains Maison in the Financial Times. "Therefore, every set of data recorded by each eye presents real miniature variations," he adds.

The aim of the experts now is to test the new technology in smartphones, where it could be used to secure any payments or access to other services, such as email. If Maine is right and the "unique biometric pin" proves to be effective, then it can not be ruled out even in automatic pick-ups or security doors.

tanea.gr

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).