{"id":81279,"date":"2016-09-24T23:43:49","date_gmt":"2016-09-25T03:43:49","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2021-07-20T12:57:49","modified_gmt":"2021-07-20T16:57:49","slug":"fido","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/fido\/","title":{"rendered":"FIDO"},"content":{"rendered":"<p><a href=\"http:\/\/hothardware.com\/news\/elcomsofts-internet-password-breakers-scares-the-crap-out-of-us\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-104907 size-medium\" title=\"FIDO\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Password_Dog-4.jpg?resize=150%2C113&#038;ssl=1\" alt=\"FIDO\" width=\"150\" height=\"113\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Password_Dog-4.jpg?resize=150%2C113&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Password_Dog-4.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Password_Dog-4.jpg?w=500&amp;ssl=1 500w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>Since 2013 there have been nearly <strong>5 billion data records lost or stolen<\/strong> according to the <a href=\"http:\/\/breachlevelindex.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/breachlevelindex.com\/\">Breach Level Index<\/a>. The <a href=\"https:\/\/www.un.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">UN<\/a> <a href=\"http:\/\/qz.com\/179897\/more-people-around-the-world-have-cell-phones-than-ever-had-land-lines\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/qz.com\/179897\/more-people-around-the-world-have-cell-phones-than-ever-had-land-lines\/\">says<\/a> there are 6.8 billion mobile phone accounts which mean globally 96% of humans have a cell phone. It would seem that these factoids could interact to cut the pace of lost or stolen data records. An effort is underway to use mobile devices to better secure data called FIDO.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20150531012933\/http:\/\/www.surepassid.com:80\/partner-with-us\/fido-alliance\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104910\" title=\"https:\/\/fidoalliance.org\/\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fido_logo.png?resize=110%2C66&#038;ssl=1\" alt=\"https:\/\/fidoalliance.org\/\" width=\"110\" height=\"66\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fido_logo.png?resize=150%2C90&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fido_logo.png?resize=75%2C45&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/fido_logo.png?w=250&amp;ssl=1 250w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a><a href=\"https:\/\/fidoalliance.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>FIDO<\/strong><\/a> (Fast ID Online) is an <strong>open standard for a secure and easy-to-use universal authentication<\/strong> interface. FIDO plans to address the lack of interoperability among strong authentication devices. <a href=\"http:\/\/searchsecurity.techtarget.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/searchsecurity.techtarget.com\/\"><em>TargetTech<\/em><\/a> <a href=\"http:\/\/searchsecurity.techtarget.com\/feature\/Password-free-authentication-Figuring-out-FIDO\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/searchsecurity.techtarget.com\/feature\/Password-free-authentication-Figuring-out-FIDO\">says<\/a> FIDO is developed by the <a href=\"http:\/\/en.wikipedia.org\/wiki\/FIDO_Alliance\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/en.wikipedia.org\/wiki\/FIDO_Alliance\">FIDO Alliance<\/a>, a non-profit organization formed in 2012. FIDO members include <a href=\"http:\/\/www.agnitio-corp.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Agnitio<\/a>,\u00a0<a href=\"http:\/\/www.alibabagroup.com\/en\/about\/overview\" target=\"_blank\" rel=\"noopener noreferrer\">Alibaba<\/a>, <a href=\"http:\/\/www.arm.com\/index.php\" target=\"_blank\" rel=\"noopener noreferrer\">ARM<\/a>\u00a0(<a title=\"NASDAQ | ARMH\" href=\"https:\/\/web.archive.org\/web\/20191012191750\/https:\/\/www.thestreet.com\/quote\/BBRY.html\" target=\"_blank\" rel=\"noopener noreferrer\">ARMH<\/a>), <a title=\"Blackberry\" href=\"http:\/\/us.blackberry.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Blackberry<\/a> (<a title=\"NASDAQ | BBRY\" href=\"https:\/\/web.archive.org\/web\/20191012191750\/https:\/\/www.thestreet.com\/quote\/BBRY.html\" target=\"_blank\" rel=\"noopener noreferrer\">BBRY<\/a>), <a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> (<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>), <a href=\"https:\/\/www.infineon.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Infineon Technologies<\/a>, <a href=\"http:\/\/www.lenovo.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Lenovo<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/OTC-LNVGY\/\" target=\"_blank\" rel=\"noopener noreferrer\">LNVGY<\/a>), <a href=\"https:\/\/www.mastercard.us\/en-us.html\" target=\"_blank\" rel=\"noopener noreferrer\">Master Card<\/a>, <a title=\"Microsoft\" href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a> (<a title=\"NASDAQ | MSFT\" href=\"https:\/\/www.google.com\/finance?cid=358464\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>), <a href=\"https:\/\/www.netflix.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Netflix<\/a>, <a href=\"https:\/\/www.noknok.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Nok Nok Labs<\/a>, <a href=\"http:\/\/www.paypal.com\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/www.paypal.com\">PayPal<\/a>, <a href=\"https:\/\/web.archive.org\/web\/20220106020516\/https:\/\/www.rsa.com\/en-us\" target=\"_blank\" rel=\"noopener noreferrer\">RSA<\/a>, <a target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"javascript:void(0)\">Samsung<\/a>, <a href=\"http:\/\/www.synaptics.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Synaptics<\/a>, <a href=\"http:\/\/www.validityinc.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/www.validityinc.com\/\">Validity Sensors<\/a> and <a href=\"https:\/\/usa.visa.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Visa<\/a>.<\/p>\n<p>The <a href=\"https:\/\/fidoalliance.org\/specifications\/overview\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"https:\/\/fidoalliance.org\/specifications\/overview\/\">FIDO specifications<\/a> define a common interface for <strong>user authentication on the client<\/strong>. The article explains the goal of FIDO authentication is to promote data privacy and stronger authentication for online services without hard-to-adopt measures. FIDO&#8217;s standard supports <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/multifactor-authentication-MFA\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/searchsecurity.techtarget.com\/definition\/multifactor-authentication-MFA\">multifactor authentication<\/a> and strong features like <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/biometrics\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/searchsecurity.techtarget.com\/definition\/biometrics\">biometrics<\/a>. It stores supporting data in a smartphone to eliminate the need for multiple passwords.<\/p>\n<p><a href=\"https:\/\/www.computerhope.com\/jargon\/e\/encrypt.htm\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104912\" title=\"encrypted virtual container\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypt.jpg?resize=100%2C92&#038;ssl=1\" alt=\"encrypted virtual container\" width=\"100\" height=\"92\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypt.jpg?resize=150%2C138&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypt.jpg?resize=75%2C69&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypt.jpg?w=337&amp;ssl=1 337w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>The author writes that FIDO is much like an encrypted virtual container of strong authentication elements. The elements include: <strong>biometrics<\/strong>, USB <strong><a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/security-token\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/searchsecurity.techtarget.com\/definition\/security-token\">security tokens<\/a><\/strong>, <a href=\"http:\/\/en.wikipedia.org\/wiki\/Near_field_communication\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/en.wikipedia.org\/wiki\/Near_field_communication\">Near Field Communication<\/a> (<strong><a href=\"http:\/\/searchmobilecomputing.techtarget.com\/definition\/Near-Field-Communication\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/searchmobilecomputing.techtarget.com\/definition\/Near-Field-Communication\">NFC<\/a><\/strong>), <a href=\"http:\/\/en.wikipedia.org\/wiki\/Trusted_Platform_Module\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/en.wikipedia.org\/wiki\/Trusted_Platform_Module\">Trusted Platform Modules<\/a> (<strong><a href=\"http:\/\/whatis.techtarget.com\/definition\/trusted-platform-module-TPM\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/whatis.techtarget.com\/definition\/trusted-platform-module-TPM\">TPM<\/a><\/strong>), embedded secure elements, <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/smart-card\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/searchsecurity.techtarget.com\/definition\/smart-card\">smart cards<\/a>, and <a href=\"http:\/\/searchmobilecomputing.techtarget.com\/definition\/Bluetooth\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/searchmobilecomputing.techtarget.com\/definition\/Bluetooth\">Bluetooth<\/a>. Data from authentication sources are used for the local key, while the requesting service gets a separate login to keep user data private.<\/p>\n<p>FIDO is based on <strong><a href=\"https:\/\/www.khanacademy.org\/computing\/computer-science\/cryptography\/modern-crypt\/v\/diffie-hellman-key-exchange-part-1\" target=\"_blank\" rel=\"noopener noreferrer\">public-key cryptography<\/a><\/strong> that works through two different protocols for two different user experiences. According to <em>TargetTech<\/em> the <strong>Universal Authentication Framework<\/strong> (UAF) protocol allows the user to register an enabled device with a FIDO-ready server or website. Users authenticate on their devices with fingerprints or PINs, for example, and log in to the server using a secure <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/public-key\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/searchsecurity.techtarget.com\/definition\/public-key\">public key<\/a>.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104915\" title=\"authenticate users with a strong second factor\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile_authentication.png?resize=95%2C95&#038;ssl=1\" alt=\"authenticate users with a strong second factor\" width=\"95\" height=\"95\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile_authentication.png?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile_authentication.png?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile_authentication.png?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 95px) 100vw, 95px\" \/>The<strong> <a href=\"https:\/\/en.wikipedia.org\/wiki\/Universal_2nd_Factor\" target=\"_blank\" rel=\"noopener noreferrer\">Universal Second Factor<\/a><\/strong> (U2F), <a href=\"https:\/\/web.archive.org\/web\/20211122221537\/https:\/\/sites.google.com\/site\/oauthgoog\/gnubby\" target=\"_blank\" rel=\"noopener noreferrer\">originally developed by Google<\/a>, is an effort to get the Web ecosystem (browsers, online service providers, operating systems) to authenticate users with a strong second factor, such as a USB touchscreen key or NFC on a mobile device.<\/p>\n<p>FIDO&#8217;s local storage of biometrics and other personal identification is intended to ease user concerns about personal data stored on an external server or in the cloud. By abstracting the protocol implementation, FIDO also reduces the work required for developers to create secure logins.<\/p>\n<p>Samsung and PayPal\u00a0have announced a FIDO authentication partnership. Beginning with the Samsung Galaxy S5 users can authorize transactions to their PayPal accounts using their fingerprints, which authenticates users by <strong>sending unique encrypted keys<\/strong> to their online PayPal wallets without storing biometric information on the company&#8217;s servers.<\/p>\n<p><a href=\"https:\/\/www.techinasia.com\/samsung-and-paypal-team-up-to-bring-singaporeans-fingerprint-scan-enabled-payments-on-the-galaxy-s5\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104917\" title=\"Samsung and PayPal FIDO authentication partnership\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/samsungfingerprintspayments.png?resize=100%2C63&#038;ssl=1\" alt=\"Samsung and PayPal FIDO authentication partnership\" width=\"100\" height=\"63\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/samsungfingerprintspayments.png?resize=150%2C94&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/samsungfingerprintspayments.png?resize=75%2C47&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/samsungfingerprintspayments.png?w=720&amp;ssl=1 720w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>FIDO promises to clean up the strong authentication marketplace, making it easier for one-fob-fits-all products. The open standards shift some of the burdens for <strong>protecting personally identifiable information<\/strong> to software on devices or biometric features, and away from stored credentials and passwords. <a href=\"http:\/\/www.computerweekly.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/www.computerweekly.com\/\"><em>ComputerWeekly<\/em><\/a> <a href=\"http:\/\/www.computerweekly.com\/news\/2240177869\/IT-industry-group-releases-password-killing-standard\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/www.computerweekly.com\/news\/2240177869\/IT-industry-group-releases-password-killing-standard\">described<\/a> FIDO&#8217;s potential this way:<\/p>\n<p style=\"padding-left: 30px;\"><em>The FIDO method is more secure than current methods because no password of identifying information is sent out; instead, it is processed by software on the end user&#8217;s device that calculates cryptographic strings to be sent to a login server.<\/em><\/p>\n<p>In the past, <strong>multiple-factor authentication<\/strong> methods were based on either a <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/key-fob\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/searchsecurity.techtarget.com\/definition\/key-fob\">hardware fob<\/a> or a tokenless product. These products use custom software, proprietary programming interfaces, and much work to integrate the method into your existing on-premises and Web-based applications.<\/p>\n<p><em><a href=\"http:\/\/crenshawcomm.com\/good-public-relaitons-two-way-street\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104919\" title=\"same authentication device can be used in multiple ways for signing into a variety of providers\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/sign_two_way.jpg?resize=110%2C47&#038;ssl=1\" alt=\"same authentication device can be used in multiple ways for signing into a variety of providers\" width=\"110\" height=\"47\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/sign_two_way.jpg?resize=150%2C63&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/sign_two_way.jpg?resize=75%2C32&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/sign_two_way.jpg?w=591&amp;ssl=1 591w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>ComputerWeekly<\/em> says FIDO will divorce second-factor methods from the actual applications that will depend on them. That means the same authentication device can be <strong>used in multiple ways for signing into a variety of providers<\/strong>, without one being aware of the others or the need for extensive programming for stronger authentication.<\/p>\n<p>Integrating FIDO-compliant built-in technology with digital wallets and e-commerce can not only help protect consumers but reduce the risk, liability, and fraud for financial institutions and digital marketplaces.<\/p>\n<p>The big leap that FIDO is taking is to use <strong>biometric data<\/strong> &#8211; voiceprint, fingerprint, facial recognition, etc. and digitize and protect that information with solid cryptographic techniques. But unlike the traditional second-factor authentication key fobs or even the tokenless phone call-back scenarios, this information remains on your smartphone or laptop and isn&#8217;t shared with any application provider. FIDO can even use a simple four-digit PIN code, and everything will stay on the originating device. With this approach, <em>ComputerWeekly<\/em> says FIDO avoids the potential for a Target-like point-of-sale exploit that could release millions of logins to the world, a big selling point for many IT shops and providers.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104921 size-thumbnail\" title=\"Target-like point-of-sale exploit\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/target.jpg?resize=75%2C75&#038;ssl=1\" alt=\"Target-like point-of-sale exploit\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/target.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/target.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/target.jpg?w=280&amp;ssl=1 280w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/>It can eliminate having to carry a separate dongle as just about everyone has a mobile phone these days this is a mobile world we live in, and we need mobile-compatible solutions; otherwise, you&#8217;re behind the curve right out of the gate.<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.zdnet.com\/article\/breaches-showing-patterns-of-good-questionable-characteristics\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-cke-saved-href=\"http:\/\/www.zdnet.com\/article\/breaches-showing-patterns-of-good-questionable-characteristics\/\">Breaches showing patterns of both desirable, questionable characteristics (ZDNet)<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>FIDO Alliance Google Microsoft Master Card Paypal Visa and others plan to use biometrics on mobile devices to secure your online ID<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2686,1400,2099,1452,1061,2767,2100,536,92,82,421,2541,1594,951,393,4,2766,2760,2761],"class_list":["post-81279","post","type-post","status-publish","format-standard","hentry","category-security","tag-2686","tag-access-control","tag-authentication","tag-biometrics","tag-bios","tag-fido","tag-fido-alliance","tag-goog","tag-google","tag-microsoft","tag-msft","tag-passwords","tag-paypal","tag-pii","tag-samsung","tag-security","tag-tpm","tag-trusted-platform-module","tag-universal-2nd-factor"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/81279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=81279"}],"version-history":[{"count":13,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/81279\/revisions"}],"predecessor-version":[{"id":125922,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/81279\/revisions\/125922"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=81279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=81279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=81279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}