An artist’s depiction of the ‘shibboleth incident.’
Detail from art by H. de Blois, from The Bible and Its Story Taught by One Thousand Picture Lessons, vol. 3, edited by Charles F. Horne and Julius A. Bewer, 1908
Going as far back as the Bible, and as widely known as the phrase 'Open, Sesame,' passwords are a textual link to our past. But they may not be around much longer.
Mapping a face is the starting point.
Computers are getting better at identifying people's faces, and while that can be helpful as well as worrisome. To properly understand the legal and privacy ramifications, we need to know how facial recognition technology works.
Researchers are looking for ways to improve our ability to recognise and match faces.
Kenya’s electronic polling system could be jeopardised by a manual backup.
In a political environment where voters are increasingly attuned to instances of polling malpractice, African states are grudgingly adopting technology as a barrier to election fraud.
Think to log in, please.
It may sound like science fiction, but research shows that all you really need to develop brain biometrics is a set of earphones.
Pauline Hanson’s One Nation has suggested a national identity card.
One Nation's proposed national identity card is unviable and likely unconstitutional, so should not be entertained.
Experimentally produced hand stencils at ‘The Cave’.
Jason Hall, University of Liverpool
New ways of using forensic science in anthropology have been developed to advance our understanding of the past.
Believe it or not but ‘123456’ and ‘password’ are still used by people today as passwords.
Tech giant Microsoft wants to rid the world of "dumb" passwords to improve online security. But maybe it's the password itself we should dump.
Voting proceeded peacefully in N’Djaména.
Advanced electoral technology could actually work against democracy in the wrong hands.
There’s a big difference between a 4-digit PIN and a 6-digit PIN.
PIN codes, passwords, swipe patterns and biometrics can help secure your smartphone, but they're far from foolproof.
Hold it right there.
President Obama's call for better electronic gun-safety systems put a spotlight on the technologies currently in the R&D pipeline that aim to make sure only authorized users can fire a gun.
Turning fingers into keys.
Biometrics in schools may compromise pupils' life-long security for the sake of short term ease of administration.
Public anxiety and legal protections currently pose a major challenge to anyone wanting to introduce eye-scanning security technologies.
Soon you will be the key.
face scan by Franck Boston/www.shutterstock.com
The days of the username and password combo may be numbered as biometric security grows more sophisticated.
Keys at your fingertips, but the technology isn’t there yet.
How can we ensure that someone is who they say they are? How can be sure that the person in our system, both digitally speaking or physically in front of us, is who whom they claim to be? You may think…
Can you really identify a person based on the way they type?
e y e / s e e /flickr
There are two elephants in the digital classroom. Or, to be more specific, two big questions: Are Massive Open Online Courses (MOOCs) economically sustainable, a function of the interaction between market…