Thursday, May 22, 2025, 8:26AM |  55°
MENU
Advertisement
Technologists wonder whether using fingerprints, faces or devices to log in would help or hurt the cause of data security and privacy.
1
MORE

If passwords can’t protect your account, can fingerprints do the trick?

Getty Images

If passwords can’t protect your account, can fingerprints do the trick?

High on the White House’s hit list: The series of letters, numbers and symbols you type in when you access everything from your bank account to your Netflix list.

"Kill the password dead as a primary security measure," urged Michael Daniel, the president’s cybersecurity coordinator, at the International Conference on Cyber Engagement, held last week at Georgetown University in Washington, D.C. As more and more devices connect to the Internet, we need to develop new ways of confirming our identities, he said.

Technologists wonder, though, whether using fingerprints, faces or devices to log in would help or hurt the cause of data security and privacy. Businesses, meanwhile, have mostly taken a pass on investments that would allow them to move beyond the password.

Advertisement

“I would love to kill the password dead, but I don’t know what we can replace it with that would be viable now,” said Lorrie Faith Cranor, director of Carnegie Mellon University's CyLab Usable Privacy and Security Laboratory, which has studied passwords (see sidebar).

Political campaigns down to the state House level are targeting voters via social media based on information collected by social media companies and Big Data firms.
Rich Lord and Chris Potter
Political campaigns rely on social media data to target voters

Hackers send “phishing” emails or make phone calls to fool people into giving up their passwords, or use sophisticated software to flood systems with educated guesses.

According to last year's federal indictment of five members of China's People's Liberation Army, that country's cyberespionage Unit 61398 "stole the usernames and passwords for at least 7,000 employees" of Allegheny Technologies Inc., "allowing them to monitor activity on those systems and to steal ATI's information in the future."

“The beauty of the password hack is, it’s not elegant,” said David Kane, CEO of Ethical Intruder, a Central North Side company that helps clients find vulnerabilities to hackers. “But if I get the password of the CEO, people will never know that I hacked into the system.”

Advertisement

Though the five Chinese hackers have not been arrested, the indictment handed down by U.S. Attorney David Hickton was heralded at the conference as an important warning shot. It hasn’t, however, awakened every corporate IT department to the vulnerability of password-protected networks.

“Unfortunately, I think companies are probably pretty far behind in actually making that big switch” from passwords to more advanced network security, Mr. Kane said.

Technologists all over the world are floating apps that unlock your phone only when they see your face, fingerprint readers and retina scanners that connect to PCs, and wearable devices that automatically fill in your passwords but lock your computer when you step away. All have weaknesses.

“People are wary of the fingerprint. They’re wary of the eyeball scan,” said Mr. Kane. “It already has been proven with biometrics that if somebody can lift your fingerprint” they can enter your print-protected accounts.

Beyond memory, introducing new ingredients into the current password stew can only increase variety and hamper hacking attempts, according to one expert.
Deborah M. Todd
Can emoji passwords confuse hackers?

There’s no guarantee that a fingerprint, once digitized, stored on a device and transmitted, can’t be snatched by a hacker, said Jeramie Scott, national security counsel for the Electronic Privacy Information Center.

“Unlike a password, once a biometric is compromised, it can’t be changed. That’s it,” said Mr. Scott. “We don’t want to trade off one privacy issue for another.”

He also worried about the potential for “mission creep.” If we all use our faces to unlock our phones, for instance, what’s to keep corporations or the government from using that database and the growing network of cameras to track our movements?

A more privacy-friendly solution, he said, might be a combination of passwords and electronic devices to unlock accounts.

Some security-sensitive companies have equipped employees with key fob-style tokens that generate constantly changing passwords that control access to networks. That technology suffered a severe setback in 2011, when hackers broke into the tokens marketed by RSA, the security division of Massachusetts-based EMC Corp., and then penetrate Lockheed Martin's supposedly ironclad network.

At the conference, experts agreed that as everything from your car to your pacemaker goes online, the need for something, beyond the password, becomes critical. "In some ways, the window for doing this is already starting to close,” said Mr. Daniel, of the White House.

Unfortunately, said Ms. Cranor, we’re not yet ready to put to bed the likes of babygirl123. “We don’t have a perfect solution right now,” to replace the password, she said, “or any solution that’s even close to a perfect solution.” 

Rich Lord: rlord@post-gazette.com or 412-263-1542. Twitter @richelord

First Published: May 4, 2015, 7:37 p.m.

RELATED
Systems increasingly demand a mixture of letters, numbers, punctuation and capitalization for passwords.
Rich Lord
This pa$$w0rd is not very secure: CMU studies reveal best and worst in passwords
Surveillance Society: An index to continuing coverage
Pittsburgh Post-Gazette
Surveillance Society: An index to continuing coverage
SHOW COMMENTS (0)  
Join the Conversation
Commenting policy | How to Report Abuse
If you would like your comment to be considered for a published letter to the editor, please send it to letters@post-gazette.com. Letters must be under 250 words and may be edited for length and clarity.
Partners
Advertisement
View of the Grove Entrance at the Brighton Rehabilitation and Wellness Center on Tuesday, Aug. 9, 2022, in Beaver, Pa. (Ariana Shchuka/Post-Gazette) #buildingmug
1
news
Two Pittsburgh-area nursing homes ordered to pay more than $15 million for health care fraud
 The Steelers left the door ajar for a four-time NFL MVP in Aaron Rodgers.
2
sports
Paul Zeise: Steelers are better with Aaron Rodgers than they are without him, so enjoy the ride
Just four years after key neighborhoods powered Mayor Ed Gainey's upset victory, some of those same areas swung their support to his challenger, Allegheny County Controller Corey O'Connor.
3
news
Looking at the maps: Voting breakdown shows Gainey's defeat primary marked by deep divides
An exterior view of the Pittsburgh Public Schools administration building as seen Thursday, Aug. 4, 2022, in Oakland.
4
news
Pittsburgh Public recommending 12 school closures under newly revised plan
Tom Streicher, 99, of Cranberry looks at his medals  while reflecting on his time in the Army during World War II.
5
life
'Last roll call:' 16 World War II veterans will be honored for their service and sacrifice
Technologists wonder whether using fingerprints, faces or devices to log in would help or hurt the cause of data security and privacy.  (Getty Images)
Getty Images
Advertisement
LATEST business
Advertisement
TOP
Email a Story