Tag Archive for 2012

I Think Therefore I Login

I Think Therefore I LoginForgetting a password could become a thing of the past according to the ZDNet article Brainwaves as Passwords; Secure and Near-Reality. John Fontana at Identity Matters says the technology to do so could be here as early as June 2013. Interaxon, which develops thought-controlled computing, is releasing the Muse headband sensor device that is designed to use brainwaves to login.

Brainwave sensors

Muse headband sensor device that is designed to bring brainwaves into computingThe slim plastic Muse headband fits against a person’s forehead and slips over the ears. The band houses four brainwave sensors. There are not any authentication applications that work with Interaxon’s Muse headband yet. The article notes that the company has a software developer’s kit (SDK) for anyone who wants to do it. However, company CEO Ariel Garten says such an app is reasonable and possible.

“The user could create a specific brainwave signature or a password they would never have to say out loud or type into a computer,” said Ms. Garten, who spoke at the Blur Conference in Broomfield, CO. According to Mr. Fontana the CEO demonstrated thought-controlled applications and the Muse headband.

Brainwave login passwords

government can read their pin numberWhile brainwave passwords might conjuror up thoughts of being snatched off the street and having a brain drain, Ms. Garten said the technology isn’t mind reading. “People might think the government can read their pin number, but we can’t read your thoughts or images in your head.” Muse, which talks to devices via Bluetooth, is an electroencephalograph (EEG) that records brainwaves and reads the brain’s overall pattern of activity to detect certain states such as relaxed or alert explains the article.

The brainwaves are turned into binary data and the translated waves are used to control anything electric. Users can learn to manipulate brainwave patterns, like flexing muscles. “This builds your brain like doing bench press reps in the gym, Ms. Garten claims.

laptops can be controlled with the mindApplications that run on smartphones, tablets, or laptops can be controlled with the mind according to the article. Ms. Garten believes the technology is set to take off, she is quoted in the article, “In 25 years, interacting with technology using your mind will be as ubiquitous as a gesture is today.”

rb-

This seems like a cool idea, maybe Sony or Nintendo will take it over. This is not a panacea for passwords.

With the small real-world experience with biometrics in the enterprise (Thinkpad T61p laptop) it worked adequately for local machine access, but what about when you have to scale this to 10s of thousands of users? Just imagine the HR issues involved with obtaining employee’s fingerprints or as the article suggests brainwaves.

In my environment, where I think biometrics makes sense, there is all the political baggage that comes with biometrics and children and the anti-education, anti-efficiency, and religious groups. I wrote here about a Texas school distinct facing the wrath of these groups for RFID cards, not biometrics.

Then there are the technical issues with any password (character string or biometric) system. The hashed password or brainwave needs to be stored somewhere in binary form. If your AD is compromised you still have a problem.

swilson, one of the commenters at ZDNet wrote: “all biometrics are the same! It doesn’t matter what trait they come up with, the same core biometric challenges remain. The challenges he sees are:

  1. How to stop replay attacks?
  2. How to secure centrally stored templates that are needed to support ‘federated’ biometric access control from multiple points?
  3. What is the real-world sensitivity/specificity trade-off i.e. quantified False Positive and False Negative Error Rates? Knowing a bit about brain physiology, I am very skeptical that anyone can measure a highly distinctive brain wave with better than 90-95% accuracy.
  4. Most basic problem: revokeability. What’s to be done in the event of a compromise, when you cannot cancel and reissue a brain wave, or fingerprint, or iris, or genome?”
Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

MSFT Powers Data Center with Sewers

MSFT Powers Data Center with SewersThe prize for the most unlikely clean power source may be going to Microsoft (MSFT). Greenbz.com reports that the boys from Redmond are working on powering data centers with sewage. Microsoft plans to power a demo data center with sewage, yeah poo.

Microsoft logoFuelCell Energy (FCEL) recently revealed to the blog, it is working with MSFT on a $5.5 million trial. The trial will use biogas from a wastewater treatment facility to power a fuel cell. The fuel cell at Dry Creek Water Reclamation Facility in Cheyenne, WY will provide “ultra-clean and carbon-neutral electricity” to a Microsoft data center.

InfoWeek says that biogas consists mostly of methane and carbon dioxide. It may also contain small amounts of other gasses, including hydrogen sulfide and nitrogen. The power is produced by anaerobic digestion. Anaerobic digestion is a process in which bacteria that live only in places without air break down organic, biodegradable matter.  Biodegradable matter is better known as sewage, animal manure, municipal waste, and plant material.

Fuel cell diagramThe initial trial will use one of FuelCell Energy’s sub-megawatt Direct FuelCell (DFC) power plant systems. The DFC will generate 200 kW of power for a Microsoft IT pre-assembled component (ITPAC) modular data center. The ITPAC is set up to resemble a standard data center environment. Any electricity not used by the data center will help power the water treatment plant. The system will also provide usable heat for the facility.

Direct FuelCell power plant systems

Power Engineering explains that stationary DFC power plants convert a fuel source into electricity and usable high-temperature heat suitable for making steam. DFC plants are fuel flexible, capable of operating on natural gas, renewable biogas, directed biogas, and other fuels including propane. The fuel cell generates electricity and heat electrochemically.

Gregg McKnight, general manager for data center advanced development at Microsoft, told Greenbiz.com that with the company has recently committed to becoming “carbon neutral” by 2013 it was committed to exploring the viability of a number of renewable energy sources. He is quoted in the article, “… Microsoft is researching new methods to help our operations become more efficient and environmentally sustainable,” he said.  “This project will study methods to provide an economical and reliable power supply for data centers that is also scalable and economical for use by other industries.”

rb-

OK let the snarky comments rip about MSFT software powered from the sewer or as one commenter noted, leave it to Microsoft to power its cloud services with a very different kind of cloud — a smellier, gaseous one.

I covered HP’s (HPQ) plans to power its data centers with cow manure here. It looks like Microsoft aims to build more data plants near other sources of renewable energy like landfills, wastewater treatment plants, and even dairy farms.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Protecting Print Devices from Malware

Protecting Print Devices from MalwarePrinter/copier firm Xerox and anti-malware firm McAfee revealed new protection against malware and viruses with the first networked multifunction printer to use McAfee Embedded Control software, a filtering method that allows only approved programs to get through to protect print devices from malware.

Xerox, McAfee Protecting Print Devices from MalwareTom Moore, vice president, Embedded Security, McAfee told Help Net Security in a recent article,When a multifunction device receives data and processes it for printing, copying, scanning or faxing, it becomes susceptible to malware attacks a susceptibility that often is overlooked.

The Xerox and McAfee security solution simplifies processes for IT administrators with software embedded into a multifunction device’s controller to give an immediate alert and audit trail to track and investigate the time and origin of security threats – and take action. The blog says this eliminates the need for IT administrators to constantly stay on top of malware threats and proactively block them.

networked printers and multifunction devicesSurvey data from Xerox (XRX) and McAfee underscores the need for embedded security in networked printers and multifunction devices. In a poll of office workers taken earlier this year: 33% say they either don’t always follow their company’s IT security policies; 21% aren’t aware of the company’s IT security policies.

The survey also showed 39% of employees who copy, scan or print confidential information at work say they wonder whether information like customer credit card numbers, financial reports, human resources, and tax documents will remain secure on networked a device.

IT administrators Self protecting networkdon’t always consider printers as a threat – and with the Embedded Control software, we’ve put up even more defenses in our products so they don’t have to,” said Rick Dastin, president, Xerox Office, and Solutions Business Group.

Xerox devices protected and managed by McAfee Embedded Control and McAfee Embedded Management software will become available beginning in 2013, with products in the Xerox WorkCentre and ColorQube product lines.

rb-

Finally, some tangible results from Intel‘s (INTC) acquisition of McAfee. We use McAfee where I manage shared technical services, and just we just rolled out version 8.8 which says Intel on it.

I have covered the risks of putting multifunction devices on your network here, here, and here. This is not what I expected, maybe this is the first evolution before Intel builds McAfee anti-virus into a chip that goes on the mainboard or even right into the processor as a way to protect print devices from malware.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

UN Wants to Put the Internet Behind Closed Doors

UN Wants to Put the Internet Behind Closed DoorsThe United Nations (UN) is calling a meeting between the world’s governments starting December 7th, 2012. It could very well decide the future of the Internet through a binding international treaty.

The Internet is in danger

It’s called the World Conference on International Telecommunications (WCIT), and it’s being organized by a government-controlled UN agency called the International Telecommunication Union (ITU).

If some proposals at WCIT are approved, decisions about the Internet would be made by a top-down, old-school government-centric agency behind closed doors. Some proposals allow for access to be cut off more easily, threaten privacy, legitimize monitoring, and blocking online traffic. Others seek to impose new fees for accessing content, not to mention slowing down connection speeds. If the delicate balance of the internet is upset, it could have grave consequences for businesses and human rights.

This must be stopped

Only governments get a vote at WCIT. We need people from all around the world to demand that our leaders keep the internet open.

Log your objections to the UN and the ITU putting control of the Internet behind closed doors at www.whatistheitu.org

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Thanksgiving 2012

I remember J.L. Hudson’s
Thanksgiving  Day Parage

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.