A login mechanism you could eat, digital tattoos and vein recognition could be among the biometric identification mechanisms that help protect corporate data in the future, according to Jonathan LeBlanc, PayPal’s global head of developer advocacy.

In a presentation that was made publicly available on SlideShare, LeBlanc outlines a series of biometric identification possibilities that could, as he puts it, “kill all passwords.” He goes well beyond mere fingerprint scanning or facial recognition tools to explore sensors embedded under the skin or ingestible authentication devices that could later be destroyed by stomach acid.

As farfetched as some of these ideas may seem, LeBlanc explained in an interview with The Wall Street Journal that almost anything would be better than the type of easily detected passwords used to secure computer systems today. On the other hand, he said the presentation was intended to merely spark discussion, not to suggest PayPal was coming out with biometric identification tools anytime soon.

As with other security standards, it may be that the industry will develop the next generation of biometric identification in a collaborative fashion. Wired UK pointed out that PayPal and others are already members of the Fast Identity Online Alliance, which is working on a range of specifications to securely authenticate users. There have also been partnerships between security vendors such as Kaspersky Lab and hacking collectives such as BioNyfiken to work on joint solutions.

The big question is whether the average individual would be comfortable with credentials that are stored inside their bodies, rather than using identifiers that are simply digitally read by a piece of hardware. A story on TechWorld pointed to Halifax Bank, which is reportedly tying authentication into heart-monitoring systems as a way for some customers to gain access to their accounts. Still, although smartwatches and smart eyewear are poised to hit the mainstream in 2015, this would take wearables to a whole new level.

These various forms of biometric identification are still up for debate, but even the most die-hard cybercriminals would probably agree they will work more effectively than “123456,” which The Telegraph noted was the most popular password of the past year.

Image Source: iStock

More from

How Do You Plan to Celebrate National Computer Security Day?

In October 2022, the world marked the 19th Cybersecurity Awareness Month. October might be over, but employers can still talk about awareness of digital threats. We all have another chance before then: National Computer Security Day. The History of National Computer Security Day The origins of National Computer Security Day trace back to 1988 and the Washington, D.C. chapter of the Association for Computing Machinery’s Special Interest Group on Security, Audit and Control. As noted by National Today, those in…

Deploying Security Automation to Your Endpoints

Globally, data is growing at an exponential rate. Due to factors like information explosion and the rising interconnectivity of endpoints, data growth will only become a more pressing issue. This enormous influx of data will invariably affect security teams. Faced with an enormous amount of data to sift through, analysts are feeling the crunch. Subsequently, alert fatigue is already a problem for analysts overwhelmed with security tasks. With the continued shortage of qualified staff, organizations are looking for automation to…

Worms of Wisdom: How WannaCry Shapes Cybersecurity Today

WannaCry wasn't a particularly complex or innovative ransomware attack. What made it unique, however, was its rapid spread. Using the EternalBlue exploit, malware could quickly move from device to device, leveraging a flaw in the Microsoft Windows Server Message Block (SMB) protocol. As a result, when the WannaCry "ransomworm" hit networks in 2017, it expanded to wreak havoc on high-profile systems worldwide. While the discovery of a "kill switch" in the code blunted the spread of the attack and newly…

Emotional Blowback: Dealing With Post-Incident Stress

Cyberattacks are on the rise as adversaries find new ways of creating chaos and increasing profits. Attacks evolve constantly and often involve real-world consequences. The growing criminal Software-as-a-Service enterprise puts ready-made tools in the hands of threat actors who can use them against the software supply chain and other critical systems. And then there's the threat of nation-state attacks, with major incidents reported every month and no sign of them slowing. Amidst these growing concerns, cybersecurity professionals continue to report…