Contact for a training/ support in digital safety

Use a pseudonym if you are not comfortable with submiting your real name

FINGERPRINTS; SECURITY FEATURES

A finger print placed on paper

Fingerprint identification is the method of identifying people with patterns on their fingertips. Fingertips have been used for a very long time, since the world’s beginning. You understand that in the early days, fingerprints were used instead of signatures because most people didn’t know how to write. If there was a land agreement to be signed, the people placed their fingers in mud and then pressed on the paper to be able to sign.

Fingerprint technology has become one of the most common ways to secure devices, verify identity, and even access public services. On the good side, it offers stronger protection than passwords, reduces fraud, and increases convenience for millions of people. But without strong policies on data protection and oversight, the same technology can put citizens at risk. Biometric databases can be hacked, misused by governments for surveillance, or exploited by companies without consent. This is why conversations about fingerprints must go beyond technology alone and address the policies that ensure biometrics are used safely and responsibly.

Why are fingerprints unique security features?

No two fingerprints look alike, there is a difference. Even after making several comparisons using billions of computations, it has been discovered that there has to be a great difference in the fingertips. That is why many governments have adopted the use of fingerprints as a security feature. Read onin.com’ article on fingerprints

https://onin.com/fp/fphistory.html

The Bad Side of Fingerprint Technology Without Strong Policies

Surveillance risks

Governments may use fingerprint databases to track citizens without accountability.

Weak data protection

In many African countries, data protection laws are either missing or poorly enforced, making biometric data vulnerable to leaks.

Hacking & breaches

Once a fingerprint database is hacked, the data can never be changed, unlike a password.

Lack of consent

Citizens often have no choice when fingerprints are collected for SIM registration, national ID, or voting, raising ethical concerns.

Corporate misuse

Companies may store or share biometric data with third parties without informing users.

Exclusion risks

Technical failures or errors in fingerprint systems can deny people access to services (healthcare, banking, or social welfare).

No clear accountability – When fingerprints are misused or leaked, policies rarely define who is responsible or how victims are compensated.

In what instances are fingerprints used in security?

In criminal cases.

The police have often used fingerprints to identify criminals. If there is a murder scene, one of the first things that the police will check out for is the fingerprint. That is why if you find someone dead, you shouldn’t touch them because you will destroy the evidence and be pinned for a crime you did not commit. What do police usually scan? They could scan anything that could be touched like a cloth, door knobs, computers

How are the fingerprints scanned?

Once evidence is collected, fingerprints are computerized by the police. The collection of fingerprints varies according to the type of fingerprint; latent fingerprints are formed when the body’s sweat gets in touch with the surface; they are not readily available and detection requires the use of fingerprint powders.

Patent fingerprints are the easiest to collect; they are simply photographed using a high-resolution with a forensic measurement scale in the image. The investigators can improve on the fingerprints by working on the lighting or using dyes

Latent fingerprints are a bit hard to scan and trace; the surface suspected to have the fingerprint is dusted with fingerprint powder and when the fingerprint appears, it is photographed improved, and lifted from the surface using superglue

Comparison with already collected information

So the already existing databases are used to analyze potential matching sources. Some of the databases could be government databases where fingerprints are captured for example the Interpol database, and the National Identification Agency database. Many of the databases enable the identification of the match. It is after making the match that the potential offenders are identified. That is why there are instances when arrests are performed

In the protection of electronic devices

We realize that if we use fingerprints to protect our devices like phones, no one has access to the information that is in them. This is because fingerprints never look alike and so if a hacker tries to open your phone, the fingerprint will be repelled

Biometric as a lock; sample finger prints

In the protection of bank accounts

For you to be able to withdraw money when you don’t have proof of identification, you must put your fingerprint for scanning so that protection is ensured in the account. When you go and withdraw money from a bank’s counter, your fingerprint is scanned to verify if you are the owner of the account

In clearing off offenses

This happens in the Interpol mostly. If the state wants to verify that there is nothing wrong with you and you are not a criminal, your details are collected and matched with the details of other security agencies to show you are not a criminal

In the identification of unknown persons.

This could happen when someone had been kidnapped and has now been recovered when an accident has happened and the police don’t even know the name of the accident victims

There are so many instances where persons have been kidnapped but I am just going to refer you to external links that could aid your reading. I am not so fine today

https://www.forensicsciencesimplified.org/prints/how.html

https://www.forensicsciencesimplified.org/prints/why.html#:~:text=Fingerprints%20can%20be%20used%20in,their%20fingerprints%20are%20on%20file)

Government Policy Recommendations on Fingerprint Technology

Transparency Requirements
Require all agencies and companies to clearly explain why fingerprints are collected, how long they are kept, and who has access.

Informed Consent
Ensure that people give clear, voluntary consent before their biometric data is taken, except where strictly necessary for public interest.

Cybersecurity Standards
Mandate encryption, secure servers, and regular audits for all institutions handling fingerprint databases.

Accountability Measures
Define penalties for misuse of biometric data and provide compensation mechanisms for victims of data breaches.

Limit Mass Collection
Prevent unnecessary collection of fingerprints for services where less invasive identification methods could work.

Inclusion Mechanisms
Provide alternatives for people whose fingerprints are worn out, damaged, or unreadable, so they are not excluded from services.

Public Awareness Campaigns
Educate citizens on their biometric rights and how to report misuse.

One advise is that whenever you come across a crime scene, try as much as possible not to touch anything or use gloves if you must because you may be implicated for a crime you never committed. Your fingerprint often stays on the item. I have already described how it is possible above and trust me you would want to fall victim

You may love other articles on this blog and so I am embedding the posts of this blog for your relevance

Prevent adware attacks

Prevent adware attacks with these 5 useful tips

Adware has a high potential of harming your computer as well as destroying every information you hav…

How to recover a hacked Whatsapp Account; 2 ways

Hello, it has been a long time sharing with you something about digital security. During the time I …

Why your Linkedin account was restricted

10 reasons why your linkedin account was restricted

Are you wondering why your LinkedIn account was restricted? LinkedIn is a good platform for networki…

Can anyone hack google photos?

Can anyone hack google photos?: 5 answers

Google Photos is a feature of your Google account. The question ” Can anyone hack Google Photo…

6 Secure browsing practices to adopt

6 secure browsing practices to adopt in 2025 for safer online experiences

Secure browsing practices are key to ensuring that internet users do not fall prey of cyber threats …

Phones are used for vishing

10 ways to know it is Vishing; a famous phishing scam nowadays

Vishing is the act of scammers using malicious calls to gather information or money from their victi…

Be cautious of alerts from paypal for resetting your password

6 Tips for preventing PayPal Scam

Preventing PayPal scam is crucial in this error where there is too much malicious activity being don…

Archives

6 effective tips for checking phishing links

Tools for checking phishing links Phishing links have traditionally been used to steal people’…

7 sure ways on how to protect a website from spam

Having a huge number of spam comments and registrations on your WordPress site can be extremely anno…

6 signs of a Facebook hacked account

Most victims of hacking get to realize that their Facebook account was compromised after over a mont…

3 free tips on how to recover a hacked facebook account with changed email and password?

The present-day hackers go as far as changing the email and password associated with a Facebook acco…

3 Good Phishing attack examples

One of the most recent phishing attacks is the UNICEF Phishing campaign that has consumed money from…

Prevent adware attacks with these 5 useful tips

Adware has a high potential of harming your computer as well as destroying every information you hav…

1 2 3 4 7

About author

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *