Time | Item | Presenter | Notes |
---|
| Biometric inputs | Mike Chaudoin | ![image-20240228-170829.png](https://kantara.atlassian.net/wiki/download/thumbnails/384204823/image-20240228-170829.png?version=1&modificationDate=1709140112965&cacheVersion=1&api=v2&width=912)
Discussion about how to bring the diagram into the discussion - so that we can speak to the biometrics-oriented audiences Dan: there might be arrows missing if we overlay the IDPV flows and consider deepfakes - e.g. during enrollment, capture of the reference may go via the signal processor box into the data storage box. Jay: where do injection attacks happen in this diagram? Mike notes that this diagram was originally created for the fingerprint Stephanie has an updated diagram that addresses deepfakes
![image-20240228-172844.png](https://kantara.atlassian.net/wiki/download/thumbnails/384204823/image-20240228-172844.png?version=1&modificationDate=1709141327348&cacheVersion=1&api=v2&width=912)
Joey: points out that the new world is both the biometric sampling and also now reference document modifications Sean: a big part of the threat is the ability to scale the attacks - important considerations Andrew: points out that we have to address physical document fakes during the transition towards digital ID documents (10-15 years)
- Mike and Joey to work on updating the architecture diagram for the world of deepfakes - use it to point back into our other content work
|
| What to do with Heather’s content topics? | Jay | A Book with content on cyber-crime motives: https://www.goodreads.com/book/show/38502106-industry-of-anonymity |
| Next week topic | | Dawid: To present on forensics Joey: to demonstrate live injection of deepfake into Zoom call |
| Places to follow | | |