Re: Yet another clueless "security" spokes-head.
Apparently, Bhalla's never seen people use image manipulation software.
Also it indicates that there are many other stages to attack than just the photo session.
Bhalla says the image like other biometric forms will be converted to a format such that a person's photo is neither stored nor transmitted in its normal construction.
So the "verification" aspect isnt actually a photo comparison in the way human eyes would do it. It is likely that the process involves capturing some key data (ratio of distance between eyes and width of mouth or whatever voodoo they want here) and then hashing it to send back for a verification check.
Not only does it open the door for many more attacks on the mobile device and its transmission signal, but it also seems fraught with false negatives at the checkout point.
Sense - I see non here.