• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Apple explains Face ID on-stage failure

November 7, 2017 by Younes Khantouri Leave a Comment

Apple has lunched recently the new IphoneX with a new future called FaceID to replace the Finger print ID future. Few issues concerning the new facial recognition system have been raised, It became such a debate whether it might make it easier for the authorities or thieves to force a user to unlock their handset and whether it will handle the hijab worn by some Muslim women, among other facewear.

This new Iphone X will be available in November. Journalists at the launch at the company’s Cupertino, California headquarters were shown Face ID working in controlled circumstances.

On Wednesday, Senator Al Franken published a letter he had sent to Apple seeking more information about this new future.

The biggest question at this time how Face ID will impact iPhone users’ privacy and security, and whether the technology will perform equally well on different groups of people,” he wrote.”To offer clarity to the millions of Americans who use your products, I ask that you provide more information on how the company has processed these issues internally, as well as any additional steps that it intends to take to protect its users.”

http://www.bbc.com/news/technology-41266216

Filed Under: Week 03: Reconnaisance Tagged With:

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (33)
  • Week 01: Overview (2)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (11)
  • Week 04: Vulnerability Scanning (14)
  • Week 05: System and User Enumeration (13)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (17)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (13)
  • Week 12: Web Services (18)
  • Week 13: Evasion Techniques (13)
  • Week 14: Review of all topics (11)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in