Skip to main content

Give Apple your fingerprint? It's your call

By Jim Killock, special for CNN
updated 12:03 PM EDT, Sun September 15, 2013
STORY HIGHLIGHTS
  • Apple's new iPhone 5S features fingerprint recognition technology
  • Jim Killock: Apple must persuade public to trust them after Snowden's revelations
  • Apple's fingerprint system does create a risk of "normalizing" biometrics - Killock

Editor's note: Jim Killock is executive director of Open Rights Group, which campaigns in Britain to defend freedom of expression, privacy and consumer rights on the Internet.

London (CNN) -- Using your fingerprint to identify yourself seems beguilingly simple: it belongs only to you, and you aren't going to lose it. Apple's use of fingerprint technology -- although not the first in the industry -- seems very in tune with its ethos of making devices easy to use.

However, how safe fingerprint technologies really are does depend on how they are implemented. You might ask, is my fingerprint stored, who else can access it? Can the government demand that Apple hand my fingerprints to them, or use Apple to identify criminals from their database?

Jim Killock
Jim Killock

Apple have stated on record that they do not store fingerprints, and nor does the device. Instead, the iPhone stores the result of a check -- a "hash," which may be unique, but can't reveal your fingerprint.

But after the revelations by Edward Snowden that Apple was one of four Internet companies to have handed over data to the NSA, Apple has a much harder job to persuade the public to trust them. We need to know that backdoors won't be built into iPhones to allow security services' to retrieve your fingerprint data. The NSA has been shown to have a program of demanding means of entry to the software and hardware of all cell phones, through introducing security flaws. These flaws -- software bugs -- are also available to criminals and competing security agencies to exploit. Are we going to trust Apple's security won't be compromised? They are participants in the PRISM scheme -- whatever precisely that involves. How else are they co-operating with secret NSA demands?

The long-term answer to these security trust issues is to reveal the whole of these systems, including the underlying "source code" so that computer programmers can check how they work, and ensure that systems are not compromised. That's not really the kind of approach that Apple has been famous for, often being very closed about their software development and asking us to trust them to know best. Citizens and businesses should not have to trust their security to systems they cannot examine.

iPhone 5S has fingerprint technology
Will people buy new iPhones?

Apple's fingerprint system does create a risk of "normalizing" biometrics. Because of the iPhone's widespread use, people may increasingly expect to use similar "easy" and "safe" biometric systems, without considering that they create highly personal identification, with risks of being tracked and surveilled, and yet do not necessarily deliver the security that they imply. Other low level fingerprint ID systems suffer the same problems, yet are being employed in schools, even to replace library cards.

Biometrics can create a false sense of security. It is easy to assume that the tools really are a hard identification of an individual, and therefore, the technology cannot be fooled, or go wrong. However, systems can be fooled. Fingerprints and even your iris can be replicated.

Apple's fingerprint system may encounter a simple problem, in that the key to unlocking your phone -- your fingerprint -- could well be liberally scattered across the phone you are trying to protect. While the phone may also look for body heat, or skin irregularities, there is at least a distinct path which could be used to try to break into a phone. We'll have to see if anyone can use it successfully.

Some of these risks are manageable, through transparency and audit. The wider social risks are far harder to manage; arguably they aren't Apple's problem. Perhaps society needs to start having a much more intense debate about security and privacy, starting off with asking: whose security are we worrying about: my own, or the state's? How do I know what risks I am taking, and why should I trust any of the claims that are made?

People understand what a wallet or a doorlock is. The risks with personal and financial information are less tangible, and the risks of state abuse of power sometimes less tangible still. But these come with the digital technology; we will truly be citizens of the digital age when we can successfully debate and deal with these problems.

The opinions expressed in this commentary are solely those of Jim Killock.

ADVERTISEMENT
Part of complete coverage on
updated 5:46 AM EDT, Wed April 16, 2014
It was supposed to be a class trip to a resort island. Instead, the ferry capsized, turning the afternoon into a deadly nightmare.
updated 6:12 PM EDT, Tue April 15, 2014
From giant zippers to buttock-shaped balloons, Jun Kitagawa's public art is whimsical, erotic and playful.
updated 4:43 AM EDT, Wed April 16, 2014
Ukraine says it's forces have regained control of an airfield from Russian separatists. Nick Paton Walsh reports.
updated 1:02 PM EDT, Tue April 15, 2014
Katrina Karkazis
Romance is hard, for anyone. For people with intersex traits, love poses unique challenges.
updated 2:51 PM EDT, Tue April 15, 2014
Sky gazers caught a glimpse of the "blood moon" crossing the Earth's shadow Tuesday in all its splendor.
updated 6:29 AM EDT, Wed April 16, 2014
An "extraordinary" video shows what looks like the largest and most dangerous gathering of al Qaeda in years.
updated 12:24 PM EDT, Tue April 15, 2014
Oscar Pistorius didn't consciously pull the trigger the night he shot and killed his girlfriend, the sprinter testified at his murder trial.
updated 5:16 PM EDT, Mon April 14, 2014
Officials are launching their next option: an underwater vehicle to scan the ocean floor.
updated 8:54 AM EDT, Tue April 15, 2014
A mysterious new artwork has appeared in Cheltenham, where Britain's version of the NSA is located.
updated 11:23 AM EDT, Tue April 15, 2014
Like many parents across Liverpool, the McManamans waited. 25 years ago, it was all they could do.
updated 9:24 AM EDT, Tue April 15, 2014
The Maltese Falcon makes a swift turn while at sea.
How do you design a superyacht fit for the billionaire who has everything money can buy?
updated 11:48 AM EDT, Tue April 15, 2014
Pop art condoms in Kenya
Packaging can change how people see things. And when it comes to sex, it could maybe help save lives too.
updated 11:42 AM EDT, Tue April 15, 2014
mediterranean monk seal
Africa is home to much unique wildlife, but many of its iconic species are threatened.
updated 11:09 AM EDT, Tue April 15, 2014
A staff stands next to the propellers of Sun-powered plane Solar Impulse 2 HB-SIB seen in silhouette during its first exit for test on April 14, 2014 in Payerne, a year ahead of their planned round-the-world flight. Solar Impulse 2 is the successor of the original plane of the same name, which last year completed a trip across the United States without using a drop of fuel. AFP PHOTO / FABRICE COFFRINI (Photo credit should read FABRICE COFFRINI/AFP/Getty Images)
This solar-powered aircraft will attempt to circle the globe next year.
updated 7:56 AM EDT, Mon April 14, 2014
Most adults make the mistakes of hitting the snooze button and of checking emails first thing in the morning, writes Mel Robbins.
updated 8:43 PM EDT, Tue April 15, 2014
Ebola victims usually come from remote areas -- but now the lethal virus is in a city of two million.
updated 9:40 AM EDT, Tue April 15, 2014
Browse through images you don't always see on news reports from CNN teams around the world.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT