Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
IT Security Encryption

Exchanging Pictures To Generate Passwords 123

Roland Piquepaille writes "Today, Ileana Buhan, a Romanian computer scientist, is presenting her PhD Thesis at the University of Twente in the Netherlands. She is using biometrics to protect confidential information when it is exchanged between two mobile devices. This is a very innovative approach to security. Buhan's biometric application will generate almost unbreakable passwords from photos taken by the connected users. Here is how it works. 'To do this, two users need to save their own photos on their PDAs. They then take photos of each other. The PDA compares the two photos and generates a security code for making a safe connection.'"
This discussion has been archived. No new comments can be posted.

Exchanging Pictures To Generate Passwords

Comments Filter:
  • Oh Dear (Score:3, Interesting)

    by smallfries ( 601545 ) on Thursday October 23, 2008 @08:03PM (#25491677) Homepage

    This sounds like interesting work as I'm sure that the hashing of the photos to generate the passwords is quite interesting research. But from the summary (on the uni site) the work is quite flawed as a security measure. If I see Alice and Bob taking pictures of each other in order to establish a secure link then all I need to do is photograph them both covertly and I can regenerate their password.

    • Re:Oh Dear (Score:5, Insightful)

      by arth1 ( 260657 ) on Thursday October 23, 2008 @08:17PM (#25491815) Homepage Journal

      It doesn't work like that. From what I can tell, it uses the image as a seed.
      This is secure as long as that picture is kept secure and NOT given to anyone else, ever.
      However, given the nature of humans, that's too tall an order. If that picture ever leaves the phone on where it was taken, the security is broken.

      • Re:Oh Dear (Score:5, Insightful)

        by wvmarle ( 1070040 ) on Thursday October 23, 2008 @09:08PM (#25492283)
        Take the pictures for this purpose only and then delete them after making the keys, problem solved.
        • Re: (Score:2, Interesting)

          by skaet ( 841938 )

          I can see the problem there. Since this requires people to be physically with each other to take the photo it will be such an inconvenience when trying to share stuff over the airwaves (as is the case with mobile networks, not so much for the limited range of Bluetooth) they will simply keep the photos on the phone.

          Phones also have incredible amounts of storage these days meaning people don't care if they take a photo and leave it since it doesn't affect anything. This easily defeats the fancy new security

          • by Anonymous Coward
            The problem is this is a Roland Piquepaille "story", and he is paid to get public relations pieces like this in Slashdot.
          • Re: (Score:2, Interesting)

            by V!NCENT ( 1105021 )

            Just let the devices make a picture of totally random crap and mix that with sound from the mic (anything it's pointed at when you hold it in your hand) and exchange it between devices. Then let the app on both phones exhcange it and hash it (the exact image is in pixels so there is no way one could ever make an exact copy of that picture and sound). This way it's just a purely random, pure text generator...

            This way it's not any different from the current connecting proces somebody goes through when connect

        • by Sloppy ( 14984 )

          Take the pictures for this purpose only and then delete them after making the keys, problem solved.

          As soon as you put it like that, the improvements suggest themselves. Just get the key from /dev/random, and if you want to use the camera's CCD as one of the feeds into your entropy pool, great.

        • by gnud ( 934243 )
          That was what I was about to say. This might be a convenient way of using one-time pads =)
      • Images as a seed (Score:5, Interesting)

        by jd ( 1658 ) <imipakNO@SPAMyahoo.com> on Thursday October 23, 2008 @10:52PM (#25493219) Homepage Journal
        That is a fairly poor way of generating a seed. I don't claim to be an expert on encryption (but you can call me one if you like), but I would use one of several different approaches, depending on the situation and the compute power available.

        One option would be to assume that the two images are a pair of asymmetric keys, given some shared asymmetric encryption function which is derived once the two images are uploaded. It doesn't matter, then, if either image (but not both) falls into the hands of someone wanting to break the encryption - without knowing the function used, having what is effectively a private key for one side of the communication won't help.

        A second option is to just use them as seeds for generating key pairs and instead of trading images, use an established method for key exchange to copy the keys across.

        Thirdly, you could generate completely random key pairs, then use the photographs as part of the encryption mode between blocks. (This would go back to needing the photographs shared, but even if both photographs were obtained by someone, it wouldn't help them much in decrypting any message.)

        Fourthly, you could generate a digital signature, where the signature assumes the image is appended to the message, with the signature as the first part of the encrypted message. This adds a little to the authentication, but also as the signature is non-deterministic, it makes those decryption techniques which involve some sort of pattern analysis of the encrypted data much less useful - you don't know where the text starts.

        Next, you could use different slices of the images to pre-generate different keypairs. You could then specify a key by specifying the offset into the image. A variant of that is to pre-generate keys randomly and use the image content at a given offset as a pointer into the key table.

        Lastly, you could prepend the message with the image, use a compression algorithm and then encrypt the compressed data. The reason for compressing is that it hides patterns in the data still visible when encrypted. By prepending the image, you absolutely drown out any possibility of residual information that could be used.

        • Perhaps you should write a PhD thesis on this topic and present it...if you haven't already done so.
        • by huf67 ( 1391347 )

          Well for somebody who doesn't claim to be an expert on encryption you've seem to throw out some 50 cent ideas about this...haha

          Nothing is ever uncrackable...If a human thought it up...a human can crack it !!! With that being said we could start to let computers generate ideas about unbreakable encryption and never(as humans) know what they are doing. But then we may have to travel back in time to save John Connors one day !!!

      • Re: (Score:2, Insightful)

        by xous ( 1009057 )
        I'm not a cryptographer but this sounds exactly like a Diffie-Hellman key exchange except using photos to generate the key.

        You would need still a copy of both photos to be able to decrypt the transmitted.

        This assumes that the key-space used is large enough that a old fashioned brute-force isn't feasible.
      • Re:Oh Dear (Score:5, Informative)

        by smallfries ( 601545 ) on Friday October 24, 2008 @05:58AM (#25495759) Homepage

        No you've completely missed the point. Each user takes their own photograph of themselves. This never leaves their device. When a connection is to be setup the other user photographs them. There are now 4 photos in the set:

        Alice's photo of Alice
        Alice's photo of Bob
        Bob's photo of Alice
        Bob's photo of Bob

        Each user now has a pair of images that should be similar (but are not the same). Alice has a photo of her and Bob, Bob has different photos of Alice and himself.

        The images are hashed in some sense to generate a seed for the key. The assumption is that the image hash is robust enough that the two different images of Alice generate the same seed, and the same for Bob.

        So if I now take a third pair of pictures, one of Alice and one of Bob, and the hash is robust then I can recompute their seed, and derive their key. As I said originally, it's some interesting vision work to come with a robust hash like that, but it is not actually secure.

        If you still don't believe me, then reread the article and consider that the security of the system relies on Alice's picture never leaving her device. The same applies for Bob. To perform key agreement that means the same seed must be derived from the separate images.


        • Obvious flaw, is what happens when Bob and Alice are unable to take photos of eachother? If they transmit them to one another, then Eve has a change to read this image. Of course, they could also create an SSH tunnel, to transfer the keys, but.. that.. would.. be... ahh nevermind, I'm sure its been hashed out numerous times already on this thread ;)
      • by Molochi ( 555357 )

        ATTFA the whole thing is based on a visual biometric program that "recognises" (ie generates the same partial key) people even when there are minor changes to their appearance. So if I take your picture and you take your picture (or a third party takes your picture) that part of the key formula is the same. If a third party takes both of our pictures within the right parameters (probably a close up full face shot or perhaps using our Drivers Licence, passport, or mugshot photo), they should have the same fu

    • Re:Oh Dear (Score:4, Funny)

      by WarJolt ( 990309 ) on Thursday October 23, 2008 @08:47PM (#25492073)

      Cameras can steal your passwords; Maybe theres some validity to what they say about cameras stealing your soul.

    • Re:Oh Dear (Score:5, Funny)

      by Anonymous Coward on Thursday October 23, 2008 @09:00PM (#25492211)

      What if the photo is based on Bob or Alice's genitals?

      For many people (fewer every year it seems), this would be a pretty good way to ensure a secret picture.

    • Re:Oh Dear (Score:5, Insightful)

      by wvmarle ( 1070040 ) on Thursday October 23, 2008 @09:01PM (#25492219)

      Every image is different, it has quite some randomness in it overall. I'm no cryptographer but can imagine that randomness is suitable to make keys.

      What this unfortunately does not seem to address is the secure exchange of those keys. Making a very large secure random key and having a strong unbreakable encryption algorithm is one, exchanging those keys in a secure manner is another. Secure as in having no way of a third party listening in undetected, and getting the actual keys.

      In this case the users have to take photos of themselves, and of each other: that indicates they have to be close together. Then the whole key exchange issue is trivial as it can be handed to the other party on a memory card or cable link or whatever. It is more interesting to be able to exchange those keys over a distance, over an insecure communication channel.

      • Re:Oh Dear (Score:5, Informative)

        by ASBands ( 1087159 ) on Thursday October 23, 2008 @09:42PM (#25492573) Homepage

        An image is random enough, but you can take a cryptographic hash of anything you want to - a password, a phone number, a song, an image, etc. How many ticks the processor has made in it's lifetime or the total value of all the bytes added up (modulus something) currently in memory will also be quite random, so the "using a picture" thing isn't really solving any problems. However, it does provide the basis of a framework that would allow you to move that picture (along with the one of yourself) to other devices in order to keep the shared secret key so you can continue to verify the person you're communicating with, since you can re-generate that key. Although there was nothing preventing you from just moving a keyfile in the first place. Don't forget - the more places the key is, the easier it will be for attackers to obtain.

        As for the secure transmission of those keys - it's called the Diffie-Hellman Key Exchange [wikipedia.org] and it has been around for over 3 decades and remains unbroken. Alice and Bob communicate some numbers which allow them to generate the same key, but Eve has no way of generating the same number.

        I also replied here [slashdot.org], so if you think this post is unclear, read there, too.

      • by fringd ( 120235 )

        Secure as in having no way of a third party listening in undetected, and getting the actual keys.

        if they are using PKE then they only need to know that the keys are not changed. it doesn't matter if the keys are simply overheard. the only keys transmitted are the public keys, which as their name suggests, are publishable.

        You only need to worry about a man in the middle attack [wikipedia.org]. It doesn't matter if anybody else hears you. You only need to know that you have gotten the key that alice transmitted, and not eve's key.

        Now, none of this may really matter. TFA is extremely thin on the details, but the way they

      • Right you are. This is just a one time pad [wikipedia.org]. Its strength can be proven mathematically via information theory. To summarize, the strongest encryption is when the key is the same length as the plaintext, so a large key (such as a jpeg of a person) is inherently stronger than a smaller one.

        As you correctly point out, the clincher is transferring the keys in a secure manner. If you're face to face with the other person you may as well exchange memory cards containing 2 gigs of data to use as the keys. Wh
    • Re: (Score:1, Funny)

      by Anonymous Coward
      The real advantage then, is for the Japanese. Because you won't know if they are exchanging information or just taking pictures.
    • I agree with you, but see a flaw in your logic:

      I would think the distance, white balance, color balance, etc. would all make a difference in the hashes generated. I mean, a difference of zoom levels on the two cameras, you taking a picture of "jane" from 4 inches away farther (or a quarter inch, depending on the resolution of the camera) could cause a completely different hash to be created (I would hope).

      There is enough difference in each CCD or other type of camera to cause confusion in that...

      Maybe not

      • by Molochi ( 555357 )

        Facial Biometric programs usually try measure a bunch of things in comparison to the size of your face like the proportional length of your nose, the proportional distance from the tip of your nose to the corners of your mouth, etc...

        There are composition rules you have to go by to get it to work. Like looking straight into the camera and presenting a large enough amount of detail to be scanned.

        Of course there are other things that could be measured, like complexion or eye color, or your bottom row of teeth

        • So, basically, they have taken what I said above to heart, and already "fixed" it.

          Not really being into Biometrics, thanks for the input. Makes sense now, and I can see how it could work.

          --Toll_Free

  • How does can this deal with the standard picture-comparison problems - different lighting, different makeup, different facial expressions? If this works, this will be big for image-search, not just passwords, but I am significantly skeptical that it works as advertised.
    • This doesn't appear to be analyzing the photo. If you look at the binary of the jpg image, it probably takes a sample of the code that comprises the image as a seed for the security. The statement appears to suggest that they must exchange the actual photo image. I take a photo of myself and then send it to you...I guess IR or bluetooth...Perhaps that's where the security could be hacked?
  • biometrics ? (Score:1, Insightful)

    by Anonymous Coward

    so where does the bio part come in ? a picture isnt bio anything
    then again this another crappy Roland article so its not suprising its short on facts and long on plagiarism

  • "and generates a security code for making a safe connection ..."

    and what if i eavesdrop that connection and duplicate that security code ?
    • by ASBands ( 1087159 ) on Thursday October 23, 2008 @09:00PM (#25492205) Homepage

      That's generally not an issue, as there are enough algorithms (such as the Diffie-Hellman Key Exchange [wikipedia.org]) which can generate a secret shared key. These processes can be done at any time, over any channel and require transmitting around a kilobyte of information between Alice and Bob. Since this can be done at any time, what is the point of taking the pictures? Most of the key-agreement protocols are anonymous, so there is no good way to verify that Bob is actually Bob, which is what this intends to solve.

      So, two users get together and associate the key which they make at the time with the photos they take of each other. The photos become the out-of-band channel that links Alice and Bob and allows for some level of authentication. This is basically a simpler solution to the key distribution problem we've already experienced with RSA - one that doesn't require a company like Verisign or a complicated "web of trust" solution. Alice trusts that Bob is Bob because Alice associated this shared secret key when she saw him AND she can see his picture when she receives the communication.

      Potential hacks? Since we're talking about mobile phones, the retrieval of the shared secret key would be almost trivial if we came into contact with the device. Even if it's not, we can associate Bob's photo with someone else and masquerade as Bob. What if we don't have possession of the device? Well, then the vulnerabilities are the same as any other symmetric-key encryption system...and AES has yet to be broken.

    • by fatphil ( 181876 )
      If this is like Diffie Hellman, which it probably is, then you can evesdrop all you like, you'll never know the shared secret key.

      However, if you can _intercept_ communications, and act like a man in the middle, then you can pretend to be Alice to Bob, while appearing to be Bob to Alice. Straight DH has no defence against this attack, you need a additional authentication stage.
  • this sounds well and good, but isn't it pretty easy to take a picture of someone else and some how fool this system?
    • If this was smart software designed to interpret an image, then getting a photo very, very close to the original might be possible, BUT this is an exachange of an actual photo. You must be standing next to the person at some point and give them via IR or bluetooth or SD or something, the actual image file that you are using. In some ways, it is just using some of the data of the photo file. It could have been a document, a song, or anything else. They just decided to use a photo, probably because it wil
      • Or because it makes a better sounding headline, and (like any crap story) generates lots of comments and hence page hits.
  • Crack (Score:3, Interesting)

    by enbody ( 472304 ) on Thursday October 23, 2008 @08:14PM (#25491793) Homepage

    Procedure: Alica and Bob have their own picture stored on their own phone. They each take a picture of the other so each has a picture pair (Alice+Bob) and construct a symmetric key from the picture pair.

    Crack: Eve takes a picture of Alice and Bob to get a picture pair (Alice+Bob) and constructs the same symmetric key.

    • by vux984 ( 928602 )

      Crack: Eve takes a picture of Alice and Bob to get a picture pair (Alice+Bob) and constructs the same symmetric key.

      Why wouldn't it have to be using the same pictures that Alice and Bob took of each other?

      • Re: (Score:3, Informative)

        by gsgriffin ( 1195771 )
        Still missing it. It has nothing to do with who is in the picture. It has to do with the actual data in the file that stores the image. Put a badge on a person in a photo and the data of the jpg file will change. You could take 20 pictures of the same person standing in the same spot, and you will come up with 20 different files (binary code in the jpg, that is). This process only works by handing over the exact image file that you are using as your ID. If they don't have that exact image file, it wou
        • by vux984 ( 928602 )

          This process only works by handing over the exact image file that you are using as your ID. If they don't have that exact image file, it wouldn't work.

          That's precisely what I meant. Alice and Bob don't even need to take pictures of eachother... they could just point and shoot in random directions, but there are clearly some convenience features inherent in using 'just taken' images of eachother.

        • RTFA. who modded this informative? you should also RTFA.

          from TFA:

          ...even if the user has altered his hair drastically, the system can still recognize him.

          so this information IS the same if you take 100 pictures of the same person standing in the same place, or a different place, or if they cut their hair or put on a badge. the crack seems ludicrously easy.

          Sadly TFA has extremely bare details. how did this become news on slashdot? I demand more details if I'm going to be bothered. Sometimes I think the admins put bad stories up just so that we can bitch about how bad they are.

  • Johnny Mnemonic http://www.imdb.com/title/tt0113481/ [imdb.com]
  • So if you take a photo of bob you ARE BOB?
    This brings identity theft to a whole new level, its like how african villagers are afraid cameras will steal their soul.
  • How do you change your key?
    Option A: Hair cut.
    Option B: New contact glasses
    Option C: Facial surgery

    This scheme seems to have the problem of biometric key schemes. As usual, how do you change a compromised key?
    • Re: (Score:2, Funny)

      by Anonymous Coward
      As usual, how do you change a compromised key?

      Easy, use a 12 gauge shotgun to randomize a new key.

    • Take a picture of your dog. That would work. In any case, you still need to give the other person the image file of the photo you take. It has nothing to do with your skin and hair color. It the actual image file that must be on both ends. Just send out a new key, but not over the Inet.
  • Why am I... (Score:2, Interesting)

    by Forthan Red ( 820542 )
    Why am I reminded of the recently invented Japanese cigarette machine, which used a camera and image analysis software to determine if the user is old enough to buy the cigs. Of course, it was easily defeated by simply holding up a picture of grandma in front of the camera.
  • by Jane Q. Public ( 1010737 ) on Thursday October 23, 2008 @08:21PM (#25491843)
    ... between this, and simply generating a shared key? Honestly, I don't see any difference. In effect, that is more-or-less what this does... generate a shared key for later communication. Big deal. It doesn't matter whether it is "biometric" at all... other than the fact that so far "biometric" data has been far easier to fool.

    And the "SecureGrip" project is a joke. In order for anyone in their right mind to stake their life on a biometric security device for their gun, it would have to reject others almost perfectly, and accept the legitimate owner infallibly... the latter being the more important of the two by far.

    We are nowhere near that kind of perfection. I wouldn't touch something that uses even the most recent versions of "SecureGrip" with a 10-foot pole, much less pay money for it.
    • And if you do have to share a key in the open, just be obscure... like, "hey remember the first name of that girl we both [redacted*] at that beach party?" - that's the password to authenticate, "oh, and use the usual case and leet-substitutions..."

      * not for salacious reasons, but just because I know the crowd here (hey, it could be "laughed at", "or felt sorry for", etc.)
    • I wouldn't touch something that uses even the most recent versions of "SecureGrip" with a 10-foot pole

      I think it can tell the difference between a 10-foot pole and the owner's palm, unless the owner is a pirate with a hook hand (which, according to the MAFIAA, has been on the rise lately).

    • ...that is more-or-less what this does... generate a shared key for later communication.

      Indeed. PhD worthy?

    • Apparently, the big thing here is that later pictures can be interpolated by the software to approximate the original conditions: Party A's machine says "This picture looks like Party B", and Party B's machines says "This picture somewhat resembles Party A". Then it guesses that if the two are close enough, it should use the shared key that was originally generated.

      Yeah, right.

      This has all been done before. All it does is weaken any key that might have been generated in the first place, because rather
    • by jasmak ( 1007287 )
      I agree with everything said particularly about the SecureGrip project. In the Netforce book series by Tom Clancy, each agent has a special ring that they wear on their hand. And all guns will only fire if a valid ring is within a certain distance of the gun. I think that this will be the way of the future. Although it does not protect against stolen rings/guns, in the case that an officer drops his gun while fighting, the enemy cannot just pick it up and shoot.
      • ... the battery goes dead? Or an electronic component fails?

        Maybe such a thing would be acceptable for the FBI, but I would not touch one unless it were absolutely reliable. Not 98% of the time, or even 99. Maybe if it were 99.99% reliable... 4 nines.
    • I haven't really had time to study it, but as far as I can tell from the original paper (available as PDF from http://eprints.eemcs.utwente.nl/10783/ [utwente.nl]) this is a user-friendly mechanism for creating a session key for two parties who are in close proximity. The key isn't supposed to be permanent. The security is provided by the fact that the picture of the other party is obtained through a "side channel" (i.e., light rays and not the channel through which the actual data exchange takes place—e.g. blueto

  • by camcorder ( 759720 ) on Thursday October 23, 2008 @08:30PM (#25491923)
    Why is that? If using random hashes make a password unbreakable then what's the ground breaking part of this? It's been known for decades that you need a very good random hash (and importance is proven with recent Debian comment-out code including gpg tools).

    This application has some 'cool factor' since it would make your shoot pictures of your friends in order to protect your 'important' communication between them, but real problem in here is not hashing, it is password generation algorithm. If it has weaknesses your random hash (ie. salt) won't make it any secure. And also how applications reach/use this password is another factor.

    Biometrics have a good 'cool factor' but they indeed put other problems into security. As other posters mentioned you can shoot picture of Alice and Bob, considering it uses facial information, you can mimic it. It is like you could get finger prints left on some fingerprint scanners. Besides libraries using those biometric data need to a lot more time to be proven as secure than textual password algorithm we use today.

    I might be a conservative about this but I still believe that even though biometrics can put some additional security, they still need to be harvested with memorized (ie. textual or verbal) passwords. If you don't harvest them, then you add possible attack vector of biometric data encoder to underlying authentication stack code as well.
  • [ I didn't RTFA ...]

    Having to match-up two different facial pics seems like a possible point of failure - Both for false-negatives and false-positives.

    Either you have advanced facial-pattern software to generate a 'fingerprint' from the pic, or you do something along the lines of downsize to 32x32 pixels, convert to black and white and hope for a 85+% match.

    It might work better if you have to take a picture of something that is 'more guaranteed' to be the same every time.

    For instance, a snapshot of your Dri

    • > I didn't RTFA

      You didn't miss anything. TFA is so content-free that it is impossible to tell what the hell this is about.

  • So... an identical twin, equipped with the technological veil of communications, can still break it? :D

  • by aj50 ( 789101 ) on Thursday October 23, 2008 @08:41PM (#25492017)

    I preferred the shake to sync method where two phones would be held together and shaken randomly. Both phones take accelerometer measurements and use the pattern they were shaken in as a shared secret.

    • Re: (Score:3, Informative)

      by pclminion ( 145572 )
      I just want to tell you how AWESOME that idea is.
    • by WarJolt ( 990309 )

      Both phones take accelerometer measurements

      One step closer to Steve Jobs plan to dominate the world with iPhones.

    • by Aladrin ( 926209 )

      The problem is synchronizing the accelerometers and getting them to take the same measurements. They aren't the most precise things in the world, and if you dumb down the data enough to sync them, you lose a lot of the security.

    • by Sloppy ( 14984 )
      If you're going to put the two phones physically together like that anyway, then why not just run a wire between 'em? Zipzip there's your OTP.
      • Re: (Score:3, Insightful)

        by rsborg ( 111459 )

        If you're going to put the two phones physically together like that anyway, then why not just run a wire between 'em?

        That'd be great, 'cept I don;t know of an easy way to cable together two iPhones, or two Blackberries, much less between two different models/manufacturers.

        The shake and bake shared secret is a great idea because it requires no additional connectivity. In fact the two devices can have NO network connection, but share only similar readings during an agreed time-window.

        Accelerometers are o

  • Comment removed based on user account deletion
  • by gandhi_2 ( 1108023 ) on Thursday October 23, 2008 @09:08PM (#25492273) Homepage
    If you "lose" your picture, you can always "reset" your picture or have it emailed to you.

    Just upload the following:

    A picture of your highschool.

    A picture of your first pet.

    A picture of your first car.

  • ... it's completely broken.

    So, who's this Ph.D. candidate and her supervisor? Because, I want names. I want to know who to stay the hell away from with regards to security.

  • If Alice and Bob are meeting in person, why do they need an elaborate key exchange protocol? Wouldn't it be easier for Alice to hand Bob a USB thumb drive with her key on it?
  • I was looking for a new way to share these hot 2girls1cup vid caps!
  • Using biometrics means the actual pics need not be exchanged, but would they have to be taken from the same angle? Also, wouldn't an app sophisticated enough to do this accurately tax the limited memory of most mobile devices? As to security, assuming the would-be eavesdropper could tell that the salt was biometrically derived AND both knew and had access to pics of the people communicating, why would they bother to go through the trouble of cracking the encryption just to find out that so-and-so was seen
  • by rossz ( 67331 ) <ogreNO@SPAMgeekbiker.net> on Friday October 24, 2008 @12:03AM (#25493845) Journal

    It looks like everybody is missing the most important part of this article. The computer geek in question is a SHE!!!1!!!!~

    We need photos.

    • Re: (Score:3, Informative)

      by MoreDruid ( 584251 )
      that wasn't so hard:
      http://wwwhome.cs.utwente.nl/~balazsi/ [utwente.nl]
      • by rossz ( 67331 )

        Hey, she's cute. I wonder if she would like to take advantage of a middle-aged American geek who has a weakness for Central European accents?

  • It might be a good idea to take a picture of Bob and Alice shaking hands, to be certain the handshake is secured, too. If there's proof the handshake really took place, you know you're connected to who you're supposed to be connecting with!
  • Doesn't Work (Score:1, Interesting)

    by Anonymous Coward

    Okay, the thing is that the connection is made based on a biometric analysis of the picture taken. It is not taking a picture simply as a seed---there are better sources of entropy than that. Alice takes a picture of Bob, this is analyzed biometrically on Alice's PDA, on the basis of which a key is constructed that is compared with the biometric data of Bob's picture of Bob on Bob's phone, and vice versa.

    To break this, get a suitable picture of Alice and Bob and you're done. You can however make it secure b

  • Manual key exchange between two people standing next to each other: So what?
    Automated key exchange between people on different continents who have never met before: Now there's a problem!

Solutions are obvious if one only has the optical power to observe them over the horizon. -- K.A. Arsdall

Working...