Weather     Live Markets

A video circulating on social media is warning people to avoid using the peace sign in selfies, as fraudsters may be able to extract fingerprints from the images and use them to hack into phones and accounts. However, experts believe that while theoretically possible, this scenario is highly unlikely due to the specific conditions required to extract fingerprint data from selfies. Additionally, many social media platforms reduce the quality of photos and videos when they are uploaded, providing an extra layer of security against potential hackers.

Even in ideal conditions, the technology required to extract biometric data from photos is not readily available and would likely involve advanced software and AI-based technology that is not common. While the video suggests precautions to avoid potential risks, such as avoiding showing fingertips clearly in photos and using filters to blur sensitive information, experts believe that the technology necessary to extract biometric data from photos is not widely accessible at this time. Biometric data is typically stored locally on devices, so hackers would also need physical access to the device to gain entry.

To practice good cybersecurity, experts recommend being mindful of the backgrounds and information shared in photos, as open source intelligence can provide hackers with clues to access data. It is important to avoid sharing closeups of eyes and to utilize voice or face recognition software rather than worrying about fingerprints. Two-factor authentication is also recommended to protect accounts and data. While fingerprints are considered a trustworthy biometric feature, experts suggest avoiding sharing high-quality pictures of irises online to prevent potential security breaches.

In conclusion, while the idea of hackers using selfies to extract fingerprints and hack into devices may be concerning, experts believe that the likelihood of this scenario occurring is minimal due to the specific conditions required and the lack of readily available technology. The precautions suggested by the video to avoid potential risks may not be necessary at this time, as current technology and security measures provide adequate protection against such attacks. It is important to be mindful of the information shared in photos and videos online to prevent potential cybersecurity threats and to utilize additional security measures such as two-factor authentication to safeguard personal data and accounts.

Share.
Exit mobile version