{"id":3589,"date":"2016-10-02T08:32:24","date_gmt":"2016-10-02T12:32:24","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=3589"},"modified":"2016-10-02T08:32:24","modified_gmt":"2016-10-02T12:32:24","slug":"make-your-password-hack-proof-by-sending-it-through-your-body","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/10\/02\/make-your-password-hack-proof-by-sending-it-through-your-body\/","title":{"rendered":"Make Your Password Hack-Proof By Sending It Through Your Body"},"content":{"rendered":"<p>This is an interesting concept that is taking biometrics to the next level. \u00a0This article describes an authentication mechanism that uses fingerprint sensors to generate signals that travel through the users&#8217; body to authenticate the user. \u00a0There is no need to send this signal over a network to authenticate the user.<\/p>\n<p>It sounds like this mechanism\u00a0is more complex and more difficult to hack than a normal fingerprint scan, but I would call it a stretch to say it is hack-proof. \u00a0As with any authentication mechanism, an algorithm is still required to perform the logic to authenticate the user and make\u00a0a decision as to whether the user is who they say they are. \u00a0This feature may make that algorithm more complex, but hack-proof \u00a0Probably not.<\/p>\n<p>&nbsp;<\/p>\n<p>link:\u00a0http:\/\/www.vocativ.com\/363636\/hack-proof-password\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is an interesting concept that is taking biometrics to the next level. \u00a0This article describes an authentication mechanism that uses fingerprint sensors to generate signals that travel through the users&#8217; body to authenticate the user. \u00a0There is no need to send this signal over a network to authenticate the user. It sounds like this [&hellip;]<\/p>\n","protected":false},"author":11274,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[715997],"tags":[],"class_list":{"0":"post-3589","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-06-project-portfolio-management","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3589","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/11274"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=3589"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3589\/revisions"}],"predecessor-version":[{"id":3590,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3589\/revisions\/3590"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=3589"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=3589"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=3589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}