Iris scan it looks practical except this method is extremely vulnerable to hackers. That can be a risk of strangers unlocking my phone and then accessing my data from the. Biometric data replacing passwords the first step in this direction was using a fingerprint to unlock the phone the best selling new phones like the samsung s eight and the i phone ten take things a step further. Instead of entering his pin number Roberto Wagner just told his samsung thats a in front of his face a built in infrared camera scans his irises the data are then compared with a recorded image of his iris and the smartphone is unlocked. I use the scanner a lot at first but i dont anymore because all i wanted to do was check the time and every time the phone would on lock itself obviously i wasnt keen. That as well as being impractical the ivory scanner in the sense of model is easy to outsmart as demonstrated by the hacker starbuck from germanys chaos computer club. He takes a photo of his eye with an infrared camera and prints out that image terms. To create a three d. Effect he attaches a contact lens on to the paper then he just holds up the new image in front of the iris scanner and in the blink of an eye the security mechanism has been cracked. You might be in a cafe or on a train you need literally a fraction of a second while the eye is open if you keep on filming the buttons face with your camera eventually youll get a decent iris image that you can use. Uses a dot map for the face over thirty thousand laser dots are projected on to the face which you can only see with an infrared camera a camera reads the map and confers it into a three d. Model which is in turn matched against the key data stored beforehand. In addition an Artificial Intelligence algorithm is used to permanently register any changes in the face and modify the face idea accordingly you can now also use the set up to pay online. But the only phone technology isnt secure either as seen in videos on social media with twins unlocking each other smartphones. Plus children can access their parents i phone. Right on just on walks my phone with his face. Complete strangers can also hack the i phone tense face i do function experts in vietnam plaintive trick the mechanism using a special mask. To building living through it its not bad to hack but on discovery is of critical importance for users in the Security Industry pollack. Missions and executives. But theres another risk this is the records the users biometric key data both manufacturers claim that this is encrypted and secure directly on the phone but the user has no control over what actually happens to it. Phone makers have different approaches to the processing of biometric data apple officials its customers that the data will remain on the device if they wish to this is not the case with microsoft and samsung they could later use their data for other purposes and if you study the terms and conditions that would be possible in the future. A further danger she says is that biometric information is more sensitive than other data. Cant be replaced like a phone number or address perhaps using the good old pin is the safer option for unlocking your phone after all. Shift says be ware of biometric identification. And now or shift ranking the most popular memes of twenty seventy number five. T. V. Cartoon characters sponge bob. Every year google puts together a list of top names based on search data people use the sponge bob mean to make fun of childish behavior and even political leaders its a huge hit. Number for a skeptical looking dog wearing a cowboy hat its called what in tarnation that southern u. S. Slang for what the heck in this mean everyone or everything is wearing a cowboy hat. Number three. I mean that stars the Childrens Book character the elf on the shelf its inspired similar rhyming titles like frog on the dog and obama on the llama. Number two a meme that features United Airlines last year a passenger was forcibly removed from a united flight and the Web Community responded with some derisive memes a protective pillow helmet. Or a mouth guard. And at number one kashmir our side is teenager danielle dr goli insulting a t. V. Talk show audiotape out. There mark went viral and helped launch danielles career as a rap artist. Her first single hit the billboard charts. Now that was ranking. And now. Digital autonomy blocked Chain Technology is expected to transform our lives the same way the internet did artists are now hoping for new ways to market themselves and gain more independence theyre counting on digital communities. The slovenian d. J. Grammatic is the first musician in the world to rely completely on crypto currency. Whether its the production of his music concerts or tour videos he finances everything with blotting many hope that this new technology can help fund Cultural Enterprises here and see how they artists have gathered to talk about it crowdfunding pioneer your highness keyes is convinced technology can change our society. With his technology each person each artist gets the chance to become more autonomous this restore some of the power citizens lost in the past years to large corporations and to technology itself. Through. Looking technology is what drives cryptocurrency is like. But it can do so much more usually. The Financial Transactions require an intermediary like banks or traders. To parties trade directly with each other its like open source bookkeeping decentralized automated and so far forgery proof this system fosters trust among participants. This principle can also help secure the value of artistic creativity. Everything for free mentality with the digital age has been costly for artists. Movie maker tony was convinced when he managed financing his first movie with glock chain alone. Chain is no different than accounting you write down what well i mean its huge and transparent schools and theres never just one call. Across the globe so no one can destroy the records. Block creates a direct line between artists and their audience to plan a project. Cryptocurrency shares an audience can also buy tickets with. Everybody who supports the project can monitor every single transaction. This kind of transparency is also hope to improve the protection of intellectual Property Rights currently there is no known way to manipulate any information stored in the block. I think in the future artists will become even more like entrepreneur they already are to a certain degree. And take high risks and i think those are qualities that will become increasingly in the future. Promotion some artists like d. J. Chromatic or tony karon are good at that. In their cases the new technology could really pay off its a way for new independent art to grow if the technology will actually become widely its. Among users. Share fairs promising prospects. And now short sweet to ship snapshots. You can choose your relatives thats walked out of the park appears to be thinking. Now his little sister is also pouring away to attention on social media the resemblance between the siblings is on canny. Go to the big hopes to be as big as her big brother one day early days of being caught on camera and shes clearly got expensive tastes already. When its time to visit the vet a little brotherly support can come in handy. That was snapshot and now. One more on the Digital World this is our Facebook Page you digital for all the latest digital news entren interesting apps gadgets and helpful tutorials you can watch the ship reports there to. Follow us and tell us what you think. And as always we leave shift through the exit internet find of the week this time the journey through time and space x. Cooper techno producer from belfast Northern Ireland likes to travel on high speed trains look out the window and see how the electrical wires seem to dance around outside its changed the way he views the world. Irish filmmaker Kevin Mclachlan has found images that capture this type of perception perfectly time and space seem to stretch and warp this edgy video with its driving beats shows the musicians and filmmakers are on their way to discovering the fourth dimension. Thats all for today on shift the next time. Creating a computer game to solve one of afghanistans biggest problems opium growing and the drug trade thats the goal of some of the countrys first generation of female Software Programmers a digital war on drugs next time on shift. What drugs are you coming. To see it clearly. Made in germany always has its finger on the pulse. Of the market the future. Spoke to. Me during. Thirty minutes to get. The birthday in good shape returning tell you and you can read this Amazing Fitness backpack and if you want to know whats inside each visit all the way. To turn the most favorite. Thing to. Call things maybe the world that actually has to do so for me. Good luck. Where i come from we have to fly for a free press i was born and raised in a military dictatorship but just want to be a shadow and if youre. Papers when official information as attorneys i have worked on the streets of many cancers and their problems are almost the same fourteen the social inequalities a lack of the freedom of the price and. We can afford to stay silent when it comes to the found something humans unseen or microphones who have decided to put them trust in us. My name is john paris and i am part of the. Jared krishna or the son in law of u. S. President donald trump has lost access to the highly classified president s daily brief. Cushion or a close trump advisor whos been operating under an interim security clearance for about a year and has access to the briefing cut off as the white house mood