• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Research/How to do it

Enhancing Security: Designer Reinvents Fingerprint Authentication for More Robust Use

Paul Balo by Paul Balo
July 31, 2016
in Research/How to do it, Security
Share on FacebookShare on Twitter

Fingerprint technology, a means of authentication, has been in existence for some time now. Tech behemoths are considering abandoning the traditional password systems due to its well-documented infirmities. The prevailing wisdom asserts that passwords for online accounts should be updated every three months to maintain secure digital protection. However, the general public’s adherence to this recommendation is lackluster at best, primarily due to the sheer number of accounts individual users possess.

Global corporations – including Google and MasterCard – are steadily transitioning from passwords to biometrics, predominantly fingerprint recognition, for the validation process. Fingerprint data, being uniquely characteristic of individuals, has traditionally been considered challenging, if not impossible, to penetrate; the data is usually stored securely on servers. However, the breaches at LinkedIn and Twitter inform us that even such data is vulnerable to theft by deft hackers operating in the nebulous dark web.

Fingerprint data, once possessed, can be sold to adversaries for nefarious use, as demonstrated when the American Office of Personnel Management was infiltrated leaving the biometric records of roughly 5.6 million people compromised. For instance, devices such as the recent iPhone versions or banking systems store fingerprint details on ostensibly “secure” servers.

Despite the inherently secure nature of fingerprints, they are not utterly invulnerable. My research unraveled that bypassing fingerprint security is not as complex as one would imagine. Simple techniques such as using rubber cement, similar to the ones we’ve used in our primary school art projects, can form exact replicas of fingerprints. However, this method necessitates the cooperation or coercion of the print owner. Other methods entail the use of gelatin, known for its conductive properties akin to human skin, and hence can easily deceive sophisticated biometric readers.

So where does that leave us in our quest for a truly secure form of identity authentication?

During my research, I discovered a [MotherBoard article](http://motherboard.vice.com/read/i-replaced-my-fingerprints-with-prosthetics-to-avoid-surveillance) highlighting an innovative concept that uses prosthetics to prevent unauthorized personal fingerprint theft. The piece was based on the work of Mian Wei, an industrial design student at Rhode Island School of Design. Wei has created a kit, termed ‘IDENTITY’, enabling anyone to overlay their actual fingerprint with a functional, replaceable, and virtually impossible to duplicate faux one.

![](https://d1s6vdzy36jczj.cloudfront.net/wp-content/uploads/2016/07/IDENTITY.jpg)

“We are all cyborgs now, connected to the internet 24 hours,” asserts Wei. His project aims to merge the gap between digital and physical security. The IDENTITY kit, packaged to mimic a common pharmaceutical item, provides store-like unease to the user. Each prosthetic is designed like band-aids from a counter-surveillance first aid kit, composed of a conductive silicone mixture integrated with a random array of fibers substituting your actual finger’s minute ridges traced by regular sensors.

Once you’ve applied the prosthetic, the generated fingerprints are randomly arrayed lines, making it virtually impossible to recognize or reproduce them. Importantly, even if someone managed to replicate your real fingerprint, they will not be able to unlock any device where the artificial fingerprint was applied.

Wei’s innovative IDENTITY prosthetics performed impressively during a two-week trial. It proved reliable once assigned to unlock a smartphone – an iPhone 6S and a Nexus 5X were put to use during the test phase. Such security improvements make fake fingerprints a plausible security measure, at least in certain situations.

We should warn, however, that this does not guarantee absolute protection either. Biometrics can sometimes be complemented with facial recognition, although faces can be easily doctored with Photoshop. As always emphasized, the onus of your digital security rests primarily on your actions. Be smart and refrain from clicking suspicious links or leaving your devices unattended.

Even with the monumental advancement made by Mian Wei’s IDENTITY prosthetics, we must remain vigilant. As technology evolves, so too does the cunning of those determined to exploit it.

This article was updated in 2025 to reflect modern realities.

Related Posts:

  • English_WhatsApp_passkey-encrypted-backups-1
    WhatsApp Adds Passkey Protection for Encrypted Backups
  • twostep
    Google Sign in Will Require 2FA Verification
  • Microsoft_passwordless
    Microsoft Will Roll Out Passkey Support For All Consumers
  • Meta-Account-Announcement_Social-Share
    Meta Revamps Its Cross-App Control System
  • Proton-Launches-Cross-Platform-Authenticator-App-with-Secure-Sync
    Proton Launch A New 2FA App
  • Microsoft Unveils New Surface Laptop
    Microsoft Plans Password Deletion for 1 Billion Users
  • csm_1200x630wa_5026e9630c
    Microsoft Pushes Edge & Disables Authenticator Autofill
  • microsoft_account_changename
    Microsoft Requires Account Sign-In Starting February

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: airtelbiometricscyber securityfingerprinthardwareIDENTITYNFLrubicon projectsecuritysponsorshipsTeams
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Amazon Spins Up A Shopping‑First Version Of Alexa For All US Customers May 13, 2026
  • Data and Fintech Lift MTN Rwanda Back to Profit in Q1 2026 May 13, 2026
  • Perceptron Mk1 AI Model Shakes Up Video Analysis Market with Massive Cost Advantage May 13, 2026
  • Google’s Gemini-powered ‘Rambler’ Dictation comes to Gboard, Raising Pressure on Voice Startups May 12, 2026
  • ‘Daybreak’: OpenAI Launches Cybersecurity Push to Rival Anthropic’s Glasswing May 12, 2026
  • Google Links First-Ever Zero-Day Discovery to AI-Assisted Hacking May 12, 2026
  • Googlebooks: Google’s Android-Powered AI Laptops Are Coming This Year May 12, 2026
  • TikTok Launches In-App Travel Booking Service ‘TikTok GO’ in the US May 12, 2026
  • GitLab Opens Voluntary Layoffs as It Reshapes for AI Era May 12, 2026
  • Instructure Reaches Deal With Hackers After Twin Breaches Of Canvas Platform May 12, 2026
  • TikTok Rolls Out Ad-Free Subscription Plan In UK May 11, 2026
  • WhatsApp Plus Launches On iOS With Premium Features May 11, 2026

Browse Archives

May 2026
MTWTFSS
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.