Attributed to Guy Bauman, Co-Founder & CMO, Ironvest. Ironvest is an all-in-one security and privacy app.

Biometrics on social media

Guy commented on the launch, “X’s introduction of biometrics is part of a growing trend amongst social media platforms aimed not just at enhancing users’ security but also clamping down on widespread identity fraud and misinformation."

"Within the last six months alone, YouTube has asked medical professionals to apply to be a verified ‘source’, while LinkedIn now allows users to confirm their identity to receive a free verification badge for their profile.”

Centralised biometrics

If fraudsters are able to breach a company’s biometric storage they can steal a huge amount of biometric data"

Biometrics is a really effective way to make sure accounts and personal data can't be accessed by unauthorised users. Yet, it doesn’t get any more personal than biometric data, so users need to be highly aware of how these social media giants are storing their most sensitive information.”

For example, using centralised biometrics, where people upload selfies to be stored in the cloud for verification purposes; leaves social media users highly vulnerable. If fraudsters are able to breach a company’s biometric storage they can steal a huge amount of biometric data given it is all stored in one central place.

Decentralised biometrics

By contrast, decentralised biometrics are now the emerging standard that people should demand of these companies. A person’s biometric data, such as a picture of their face, is called a template."

"With decentralisation, the template is broken up into different shards, encrypted, and stored securely on multiple nodes. What this means is that the whole template is never reconstructed again and thanks to a zero-knowledge infrastructure, only you have access to your data.”

Self-sovereign identity

Consumers are also right to question if they actually want to trust big tech with their biometrics, especially given these firms’ past history of collecting extensive and potentially unnecessary personal identifying information (PII)."

"In reaction to this, and underpinned by the belief that people should be in control of their own identity, there is now a movement towards giving consumers a self-sovereign identity. This means that only the individual has access to and control of their information. This approach ensures that people have complete choice over where and with whom they share their PII with.”

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?