Thoughtless Protection

Infiltron Social Responsibility

With a decentralized system, there is no central storage of biometric data. When users “enroll” a voice, they do so locally, and it is encrypted and stored on-device.

The hackers would not only have to re-create the voice of the target, they would also have to have physical access to the person’s mobile device, which is exponentially more difficult and economically infeasible,” he said.

According to a Unisys survey, the biometric measures ranked by consumer preference are: voice recognition (32%), fingerprints (27%), facial scan (20%), hand geometry (12%), and iris scan (10%). This ranking seems to confirm that people prefer convenience and familiarity when choosing a biometric technology.  

The more apps on Lock Screen: The attack surface expands → security is reduced

Read the latest from Infiltron's Blog...

Image of Google Startup Post

Infiltron Software Suite is apart of the inaugural Google for startups Atlanta Founders Academy

> Home Infiltron Software Suite is a part of the Inaugural Google for Startups Atlanta Founders Academy Google for Startups has officially launched the Atlanta Founders Academy, inspired by the first Google for Startups pop-up in the U.S. The Academy is an 8-month program for 40 Georgia-based startups that have revenue and/or user traction.Not only is the Atlanta […]

Image of Stolen Biometrics

Stolen Voice Biometrics

> Home Stolen Voice Biometrics [Replays and machine-based attacks.]Error! Filename not specified Solution Replay attack is the most accessible one: it does not require any engineering or imitation skills for someone to find a recorded audio or video of the genuine user and replay it. Unfortunately, state-of-the-art voice biometric systems are highly vulnerable to replay […]

Top