details to the highest bidder.
We demand protection, but often fail to implement the measures ourselves.
To protect our most sensitive data, we started with complex passwords. Lots of characters, a
number or two and all kinds of combinations. Later, that wasn´t enough. Two-step
authentication became the security go-to. And from one day to the next, we began using our
personal biometric data to make the security process easier, and more comfortable. We have
entrusted our unique facial and iris recognition information to companies of all kinds; banks,
alarm service companies, messaging apps, device manufacturers and more.
But what happens if your company or account is hacked? Until now, it was enough to simply
change your passwords, but how can we do that when our “passwords” are our face or our
And that begs the question: what will companies then do with our most private biometric
data? How will they use these keys to access our information?