{"id":31446,"date":"2019-11-22T07:19:00","date_gmt":"2019-11-22T12:19:00","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?page_id=31446"},"modified":"2022-05-05T11:06:42","modified_gmt":"2022-05-05T15:06:42","slug":"future-of-biometrics","status":"publish","type":"page","link":"https:\/\/www.kaspersky.com\/blog\/future-of-biometrics\/","title":{"rendered":"Own Your Digital Identity"},"content":{"rendered":"<style>#main .full-width h1,#main .full-width h3,#main .full-width h2 { color: white; font-weight: 600;}#main .full-width h1 { font-weight: 600;}#main .full-width h3 { font-weight: 300;}#main .post_content ul li:before { content: \"\";}#container { margin-top: 0;}#main { background: #fff; font-family: MuseoSans, Roboto, Droid Sans, Arial, sans-serif; font-size: 1.125rem; margin: 0; width: 100% !important;}#main * { box-sizing: border-box; line-height: 150%;}#main p { font-size: 22px;}#main .container { max-width: 1030px; margin: auto; padding: 30px 0; width: 100%;}#main .container > .full-width { padding: 0;}#main .full-width { margin: 40px 0; display: flex; justify-content: center; flex-direction: column;}#main .lead-row { margin-top: 0; min-height: 80vh; text-align: center; background: linear-gradient(to top, rgba(0, 0, 0, 0.3), rgba(0, 0, 0, 0.2)), url(https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/11\/29081932\/digital-identity-3.jpg); background-position-y: 50%; background-position-x: 50%; background-size: cover; color: #fff; font-size: 1.5em; position: relative; overflow: hidden;}#main .lead-row .container { margin: 0 auto; padding: 150px 20px 50px 20px; width: 100%; display: flex; flex-direction: column; justify-content: space-between; min-height: 80vh;}#main1 [class*=\"post-\"] { position: relative;}#main1 [class*=\"post-\"]:before { top: 0; left: -30px; height: 45px; width: 500px; transform: rotate(-15deg); z-index: 2;}#main h1 { margin-bottom: 60px; font-size: 3em;}#main h2 { font-size: 2em;}#main h1,#main h2 { text-align: center; font-weight: 700;}#main img { max-width: 100%; margin: 3rem auto; width: auto !important;}#main .video-block .thumb-wrap { position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden; margin: 3rem 0 -2rem 0; width: 100%;}#main .video-block .thumb-wrap iframe { margin: 0; position: absolute; top: 0; left: 0; width: 100%; height: 100%;}#main .how-to-list { color: #fff; background: url(https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/90\/2019\/08\/02130536\/kaspersky-brand-texture-3.jpg); background-size: cover;}#main .how-to-list#privacy { color: #fff; background: url(https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/90\/2019\/08\/02130520\/kaspersky-brand-texture-1.jpg); background-size: cover;}#main .how-to-list#social-networks { color: #fff; background: url(https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/90\/2019\/08\/02130536\/kaspersky-brand-texture-3.jpg); background-size: cover;}#main .how-to-list ul { display: grid; grid-gap: 25px; grid-template-columns: repeat(auto-fit, minmax(270px, 1fr)); margin: 0 !important; margin-top: 40px !important; list-style: none; padding: 0;}#main .how-to-list ul li { display: flex; flex-direction: column; align-items: end; border: 2px solid #fff; text-align: left; margin: 0; padding: 0; font-size: 22px; border-radius: 10px; transition: 0.3s; overflow: hidden; background-position: 50%; background-size: auto 500px;}#main .how-to-list ul li.post-1,#main .how-to-list ul li.post-1 a:last-child:after { background-image: url(https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/90\/2015\/11\/06044147\/boarding-paa-FB-1024x1024.jpg);}#main .how-to-list ul li.post-2,#main .how-to-list ul li.post-2 a:last-child:after { background-image: url(https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/90\/2016\/11\/06040900\/avito-guide-featured-1024x672.jpg);}#main .how-to-list ul li.post-3,#main .how-to-list ul li.post-3 a:last-child:after { background-image: url(https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/90\/2016\/07\/06041536\/ticket-featured-1024x672.jpg);}#main .how-to-list ul li.post-4,#main .how-to-list ul li.post-4 a:last-child:after { background-image: url(https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/90\/2018\/07\/16133457\/privacy-ten-tips-2018-featured-1-1024x672.jpg);}#main .how-to-list ul li.post-5,#main .how-to-list ul li.post-5 a:last-child:after { background-image: url(https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/90\/2019\/09\/06131554\/incognito-mode-faq-featured-a-1024x673.jpg);}#main .how-to-list ul li.post-6,#main .how-to-list ul li.post-6 a:last-child:after { background-image: url(https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/90\/2017\/11\/29124801\/website-tracking-1024x672.jpg);}#main .how-to-list ul li.post-7,#main .how-to-list ul li.post-7 a:last-child:after { background-image: url(https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/90\/2019\/06\/11115738\/vk-security-and-privacy-settings-featured.jpg);}#main .how-to-list ul li.post-8,#main .how-to-list ul li.post-8 a:last-child:after { background-image: url(https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/90\/2016\/12\/06040738\/facebook-privacy-settings-featured-1024x672.jpg);}#main .how-to-list ul li.post-9,#main .how-to-list ul li.post-9 a:last-child:after { background-image: url(https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/90\/2015\/12\/06043702\/odnoklassniki-privacy-featured-1024x672.jpg);}#main .how-to-list ul li a:nth-of-type(1) { z-index: 3; display: block; color: transparent; height: 200px; width: 100%;}#main .how-to-list ul li a:last-child { color: #fff; text-decoration: none; width: 100%; height: 100%; display: block; box-sizing: border-box; \/* margin-top: 200px; *\/ padding: 50px 30px 30px; position: relative; overflow: hidden; min-height: 245px; z-index: 1;}#main .how-to-list ul li a:last-child:after { content: \"\"; display: block; width: calc(100% + 60px); height: calc(100% + 60px); position: absolute; top: 0; right: 0; bottom: 0; left: 0; margin: -30px; z-index: -1; opacity: 1; mix-blend-mode: screen; filter: blur(10px) brightness(0.8); -webkit-mask-image: linear-gradient(to bottom, rgba(255, 255, 255, 0) 35px, black 75px); mask-image: linear-gradient(to bottom, rgba(0, 0, 0, 0), black); background-position: 50% -197px; background-size: auto 500px;}#main .how-to-list ul li:hover { transform: scale(1.05); box-shadow: #2d3e1394 0 5px 15px 2px;}#main .subsribe-text { display: flex; align-items: center;}#main .subsribe-text .logo-text { float: left; display: block; text-transform: uppercase; background: #ed2939; font-size: 18px; font-family: \"Museosanscyrl\", Helvetica, Arial, sans-serif; font-weight: 900; padding: 1px 2px 0 1px; margin-right: 10px; color: #fff;}#main .subsribe-text .fa-twitter { color: #fff; background: #55acee; padding: 5px; margin-right: 10px; width: 28px; height: 28px; font-size: 20px; display: flex; align-items: center;}@media (max-width: 992px) { #main .full-width { min-height: 100vh; padding: 0; } #main .container { padding: 20px; } #main .lead-row .container { padding: 0 20px; } #main h1 { font-size: 2em; } #main h2 { text-align: left; } #main h3 { font-size: 1em; font-weight: 400; } #main h1, #main h2, #main h3 { margin: 1rem 0 !important; text-align: left; } #main .lead-row { margin-bottom: 0; }}.how-to-button { margin-top: 1em; border: 2px solid #fff; display: inline-block; padding: 10px 70px; max-width: 100%; color: #fff !important;}.how-to-button:hover { text-decoration: none !important; background: #ffffff50;}[class*=\"post-\"]:before { top: 0; left: -30px; height: 45px; width: 500px; transform: rotate(-15deg); z-index: 2;}#main .full-width.box-block { margin-bottom: 0; color: #fff; background: url(https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/90\/2019\/08\/02130520\/kaspersky-brand-texture-1.jpg); background-size: cover; background-position: right bottom; padding: 0;}.box-block ul { list-style: none;}.box-block .container { display: flex;}.box-block img { max-height: 60vh; width: 100% !important;}#main .box-block h2 { text-align: left;}.col-md-5 { width: 41%; padding: 40px; float: left; text-align: left;}.col-md-7 { width: 59%; padding: 40px; float: left; text-align: left;}.button a { display: block; padding: 15px 40px; text-align: center; margin: 20px 0; text-decoration: none; color: #fff; font-weight: 700; transition: 300ms;}.button:hover a { transform: scale(1.02); text-decoration: none !important;}.button-red a { margin-top: 40px; background: #ed2939;}.button-red:hover a { background: #d30033;}.button-green a { background: #fff; color: #00a88e;}.button-green:hover a { color: #00836f;}@media (max-width: 768px) { .col-12 { width: 100%; } .box-block { background-position: right bottom; background-repeat: no-repeat; } .box-block img { margin: auto; display: block; } .box-block .container { flex-direction: column-reverse; } .box-block img { max-height: 60vh; } .box-block .col-12 { padding: 0; }}.entry-content,#main > article { margin-bottom: 0; padding-bottom: 0;}#main .quotes-block { background-size: cover; padding: 0; margin: 0; background: linear-gradient(to bottom, white, rgba(255, 255, 255, 0) 20%, rgba(255, 255, 255, 0) 80%, white), url(https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/11\/29081936\/digital-identity-4.jpg) 0 no-repeat; background-position: 100%; background-size: cover;}#main .quotes-block .quotes { font-weight: 600; display: flex; flex-direction: column;}#main .quotes-block .quotes p { display: block; width: 75%; margin: 2em 0;}#main .quotes-block .quotes p:nth-of-type(2) { margin-left: auto; text-align: right;}#main .quotes-block .quotes p:nth-of-type(4) { text-align: right; margin-left: auto; margin-top: 2em; font-weight: 300; opacity: 0.8;}#main .quotes-block .quotes p:nth-of-type(4) a { color: #000;}#main .quotes-block .quotes strong { font-weight: 900; color: #00a88e; font-size: 2.4em;}#main .full-width.image { padding: 0; margin: 0; max-height: 80vh; overflow: hidden; min-height: auto;}#main .full-width.image img { margin: 0; object-fit: cover;}#main .full-width.image img.full-height { object-fit: contain;}#main .full-width.read-more h2 { color: black;}#main .full-width.read-more .articles img { width: 100%;}@media (max-width: 768px) { #main .quotes { margin: 0; background-position: 100%; background-size: cover; } #main .quotes p { width: 100%; }}details { \/*margin-left: 1em;*\/ font-size: 22px; margin-bottom: 1em;}details p { padding: 0.5em 0; margin: 0;}summary:hover { color: #01a88e;}summary { \/*padding: 0.5em 1em; border: 1px solid #eee; border-radius: 5px;*\/ cursor: pointer;}summary p { display: inline-block;}.faq .questions { padding: 1em 0;}.faq > summary { text-align: center;}.faq > summary:active,.faq > summary:focus { outline: none;}.faq > summary strong { display: inline-block; color: #01a88e; border-bottom: 2px dashed #01a88e;}.faq > summary::-webkit-details-marker { display: none;}summary::-webkit-details-marker { color: #01a88e;}#main article.c-card img { margin: 0;}#main article.c-card h3 { font-weight: 900;}<\/style>\n<div id=\"main\">\n<div class=\"lead-row full-width\">\n<div class=\"container\">\n<h1>Own Your Digital Identity<\/h1>\n<h3>Together with a jewelry designer, Kaspersky shows how to avoid the risks of biometric authentication while retaining its convenience<\/h3>\n<\/div>\n<\/div>\n<div class=\"container\">\n<p>You are the only person in this world who has your fingerprints, your irises, your facial features, your DNA. As such, it\u2019s incredibly convenient to use them for authentication, proving that you are you. You probably already use it \u2013 to unlock your phone, to get a visa for another country, and maybe even to access your office.<\/p>\n<p>But what if this data is leaked and someone else gains access to your unique identifiers? They will be able to pretend that they are you! They\u2019ll be able to fake your fingerprints or your facial features and gain access to wherever you use biometric authentication. That\u2019s a huge security risk.<\/p>\n<\/div>\n<div id=\"social-networks\" class=\"full-width quotes-block\">\n<div class=\"container\">\n<div class=\"quotes\">\n<p><strong>37%<\/strong> \u2013 the percentage of computers engaged in collecting, processing and storing biometric data, on which malware was detected in Q3 2019.<\/p>\n<p><strong>5.4%<\/strong> of the aforementioned systems were attacked with spyware, potentially capable of exfiltrating biometric data.<\/p>\n<p><strong>1 mln<\/strong> biometric data entries such as fingerprints or facial recognition information were stored as plain text files in one publicly accessible database.<\/p>\n<p><sup><em>Source: <a href=\"https:\/\/ics-cert.kaspersky.com\/?p=3045\" target=\"_blank\" rel=\"noopener noreferrer\">Threat landscape for biometric processing systems, Kaspersky ICS CERT<\/a><\/em><\/sup><\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"container\">\n<p>When your password leaks, you can simply change it. But when your biometric data leaks, there\u2019s not much you can do. You can\u2019t replace your finger. You don\u2019t have a spare index finger on your right hand.<\/p>\n<p>But we are so used to the convenience of biometric authentication, is it possible to retain it without compromising ourselves? What if you could create a new finger? Or have something that you can use instead, for authentication? We at Kaspersky have thought about that and come up with a solution that potentially eliminates that particular problem of biometric authentication.<\/p>\n<p>Here\u2019s how it is possible:<\/p>\n<div class=\"video-block\">\n<div class=\"thumb-wrap\"><iframe frameborder=\"0\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/dZ813bu0Q-E\" width=\"560\"><\/iframe><\/div>\n<\/div>\n<\/div>\n<div class=\"container\">\n<p>Together with Benjamin Waye, Swedish 3D accessory designer, we came up with the idea of a beautiful ring that houses a stone comprised of thousands of conductive fibers suspended in a rubber compound that form a unique fingerprint.<\/p>\n<p>That ring can be used to authenticate the user with biometric systems, such as a phone or a smart home door lock. And if the data of the ring fingerprint leaks, the user can block this particular ring and replace it with a new one \u2013 and their own unique biometric data won\u2019t be compromised.<\/p>\n<\/div>\n<div class=\"full-width image\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/11\/29103543\/digital-identity-1-scaled.jpg\" alt=\"\"><\/div>\n<div class=\"full-width read-more\">\n<div class=\"container\">\n<h2><strong>More facts about the ring<\/strong><\/h2>\n<div class=\"questions\">\n<details>\n<summary><strong>What is the ring made of? <\/strong><\/summary>\n<p>Each ring has been 3D printed in silver and features a biometric stone \u2013 comprised of thousands of conductive fibers suspended in a rubber compound, with a unique fingerprint pattern. The smartphone fingerprint sensor reads the pattern, but also checks the conductivity of the stone.<\/p>\n<\/details>\n<details>\n<summary><strong>How does it work?<\/strong><\/summary>\n<p>The smartphone sensor picks up two features from the active biometric stone. First, it has the physical shape and texture of a real finger, with both the right pattern and flexibility. Second, it contains conductive fibers that activate the reader.<\/p>\n<p>When the stone is pressed on a fingerprint sensor, the conductivity activates the reader. The fingerprint sensor then measures both the connectivity and the pattern of the fibers, and also compares the physical pattern of the fingerprint with the one that was set up on the device.<\/p>\n<\/details>\n<details>\n<summary><strong>How is an artificial fingerprint created?<\/strong><\/summary>\n<p>Each fingerprint pattern is developed by using a software tool that is freely available online. The pattern is then adapted on a form, used to 3D print a cast. In the cast, each fingerprint stone is molded. An additional layer is added to make the stone unique, as the biometric stone is comprised of thousands of conductive fibers suspended in a rubber compound.<\/p>\n<\/details>\n<details>\n<summary><strong>How do you make sure this fingerprint is unique?<\/strong><\/summary>\n<p>The uniqueness of each biometric stone is proven through a combination of the software generated fingerprint and the thousands of metal fibers that randomly form a pattern. The combined information is not stored anywhere, ensuring no one has access to it.<\/p>\n<\/details>\n<details>\n<summary><strong>What if a ring was lost? Does it mean a fingerprint will be leaked?<\/strong><\/summary>\n<p>If the ring is lost, its artificial fingerprint can be removed as an authentication method from digital devices and replaced with another method or another ring. It does not mean that a fingerprint will be leaked.<\/p>\n<\/details>\n<details>\n<summary><strong>Can I create such a ring at home?<\/strong><\/summary>\n<p>Kaspersky wouldn\u2019t advise producing the ring at home. Although the silver part of the ring is 3D printed, the biometric stone is molded and this is a complicated process.<\/p>\n<\/details>\n<details>\n<summary><strong>Can I buy the ring?<\/strong><\/summary>\n<p>At the moment Kaspersky has no plans to sell the ring. It is not a product but the result of a collaboration between us and the designer, aimed at drawing more attention to security related issues surrounding biometrics. We believe they must be solved through technology and on the devices that are used to process such valuable data, not by customers.<\/p>\n<\/details>\n<\/div>\n<\/div>\n<div class=\"container\">\n<p>The ring is just a concept. It\u2019s not a perfect solution, however, it works with what we have now. Yet in the future that we help build, where every computer and device that processes and stores biometric data is built with security in mind, there will be no need for this ring. These systems will be immune to attacks and leaks thanks to their architecture built on secure by design systems such as <a href=\"https:\/\/os.kaspersky.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">KasperskyOS<\/a>.<\/p>\n<\/div>\n<div class=\"full-width image\"><img decoding=\"async\" class=\"full-height\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/11\/29090453\/digital-identity-2.jpg\" alt=\"\"><\/div>\n<div class=\"container\">\n<h2>Read more to learn about biometric authentication, the issues that it faces, the solutions it brings and the current state of the technology:<\/h2>\n<div class=\"articles\">\n<p><!-- <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/11\/22110328\/posts-screenshot-1.png\" alt=\"\"> --><\/p>\n<div class=\"o-row c-card__row--divider\">\n<div class=\"o-col-6@sm o-col-4@lg\">\n<article class=\"c-card\">\n<figure class=\"c-card__figure\"><a href=\"https:\/\/www.kaspersky.com\/blog\/new-fingerprint-reading-technologies\/21420\/\"><img decoding=\"async\" class=\"attachment-daily-2019-post-thumbnail-large size-daily-2019-post-thumbnail-large wp-post-image\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/03\/02101213\/new-fingerprint-reading-technologies-featured-700x459.jpg\" alt=\"\"><\/a><\/figure>\n<div class=\"c-card__content\">\n<h3 class=\"c-card__title\"><a href=\"https:\/\/www.kaspersky.com\/blog\/new-fingerprint-reading-technologies\/21420\/\" target=\"_blank\" rel=\"noopener nofollow\">Fingerprint scanning: Faster, contactless and more precise<\/a><\/h3>\n<div class=\"c-card__desc\">\n<p>Two new fingerprint-scanning technologies revealed at Mobile World Congress 2018 use different approaches.<\/p>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<div class=\"o-col-6@sm o-col-4@lg\">\n<article class=\"c-card\">\n<figure class=\"c-card__figure\"><a href=\"https:\/\/www.kaspersky.com\/blog\/biometric-atms\/13259\/\"><img decoding=\"async\" class=\"attachment-daily-2019-post-thumbnail-large size-daily-2019-post-thumbnail-large wp-post-image\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/10\/06021407\/biometric-atm-featured-700x459.jpg\" alt=\"Is biometric banking secure?\"><\/a><\/figure>\n<div class=\"c-card__content\">\n<h3 class=\"c-card__title\"><a href=\"https:\/\/www.kaspersky.com\/blog\/biometric-atms\/13259\/\" target=\"_blank\" rel=\"noopener nofollow\">Is biometric banking secure?<\/a><\/h3>\n<div class=\"c-card__desc\">\n<p>ATMs will soon use fingerprint readers and iris sensors to identify customers. But is biometric authentication as secure as advertised?<\/p>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<div class=\"o-col-6@sm o-col-4@lg\">\n<article class=\"c-card\">\n<figure class=\"c-card__figure\"><a href=\"https:\/\/www.kaspersky.com\/blog\/bad-facial-recognition\/12806\/\"><img decoding=\"async\" class=\"attachment-daily-2019-post-thumbnail-large size-daily-2019-post-thumbnail-large wp-post-image\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/08\/06021717\/bad-facial-recognition-featured-700x459.jpg\" alt=\"The dark side of facial recognition technology\"><\/a><\/figure>\n<div class=\"c-card__content\">\n<h3 class=\"c-card__title\"><a href=\"https:\/\/www.kaspersky.com\/blog\/bad-facial-recognition\/12806\/\" target=\"_blank\" rel=\"noopener nofollow\">The dark side of facial recognition technology<\/a><\/h3>\n<div class=\"c-card__desc\">\n<p>Lynch law, loss of basic privacy, disgusting marketing, digital identity theft \u2014 how else can facial recognition be misused?<\/p>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><a id=\"product\" name=\"product\"><\/a><\/p>\n<div class=\"box-block full-width\">\n<div class=\"container\">\n<div class=\"col-12 col-md-5\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/90\/2019\/09\/05182937\/ksc-box.png\" alt=\"\"><\/div>\n<div class=\"col-12 col-md-7 box-block-text\">\n<h2>Kaspersky Security Cloud<\/h2>\n<p>\u2014 Lets you know if breaches happen<\/p>\n<p>\u2014 Provides a password manager for convenient and secure password storage<\/p>\n<p>\u2014 Helps set up devices and apps to ensure security and privacy<\/p>\n<p>\u2014 Protects against malware and phishing attacks<\/p>\n<p>\u2014 Helps back up your data<\/p>\n<h2>Be in control of your information!<\/h2>\n<div class=\"button button-red\"><a href=\"https:\/\/www.kaspersky.com\/advert\/security-cloud?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____ksc___\" target=\"_blank\" rel=\"noopener nofollow\">Buy now<\/a><\/div>\n<div class=\"button button-green\"><a href=\"https:\/\/www.kaspersky.com\/free-cloud-antivirus?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">Try now<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Own Your Digital Identity Together with a jewelry designer, Kaspersky shows how to avoid the risks of biometric authentication while retaining its convenience You are the only person in this<\/p>\n","protected":false},"author":2706,"featured_media":31630,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/legacy-page.php","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"class_list":["post-31446","page","type-page","status-publish","has-post-thumbnail"],"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/future-of-biometrics\/"}],"acf":[],"banners":"","is_landing":true,"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages\/31446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=31446"}],"version-history":[{"count":33,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages\/31446\/revisions"}],"predecessor-version":[{"id":40427,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages\/31446\/revisions\/40427"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/31630"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=31446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=31446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}