Skip to main content

FBI Using Dead People’s Fingerprints To Unlock Their Phones

What if I ask you that what will happen to your phone when you die? Yes, this question may sound odd, but, today I will tell you about an unexpected incident that will simply blow your mind, according to the latest reports, recently, police are using dead people’s fingerprints to unlock their phones.

FBI Using Dead People’s Fingerprints To Unlock Their Phones

What will happen to your phone when you die? There is a strange barrier between the legal and non-legal action, which remains unclear to many. Today, we have had more than curious news related to this horrible issue, and Forbes magazine has given birth to certain actions of the FBI.
Come on, now let me tell you what you’ve already read in the title, according to the latest reports, the FBI is unlocking phones whose users have already died. A theme, which is quite odd and very few people would like to debate on it. Would you be willing for the authorities to unlock your phone with a good purpose?

The FBI is using fingerprints of the dead peoples

As we have read in Forbes magazine, the FBI admits using the fingerprints of deceased people, but for a good cause. In cases of murder, for example, authorities always have access to the information of the deceased, to check certain conversations or information that may help locate the culprit.
In the case of a crime, the police are authorized to search for relevant information on the victim’s cell phone. This can help locate the culprit, or useful clues to solve the case.
The Federal Bureau of Investigation says that they use the Touch ID of the iPhone to access information on the phones of the deceased, and that, for now, this is something they can not do with the Face ID. The news is curious, and even if it is to identify the cause of a murder, it is questionable to use our fingerprint to unlock the smartphone once dead.
As always, the debate between what is moral or not is something that we should not touch, so we leave it to you. We want you to tell us what you think about this matter, about whether you would agree that police could access the information on their phone once they were dead, using the fingerprint.
So, what do you think about this? Simply share all your views and thoughts in the comment section below.

Comments

Popular posts from this blog

What is the difference between a direct and an indirect address instruction ?

Direct addressing means the instruction refers directly to the address being accessed. That is, the instruction encoding itself contains the address of the location. Depending on the instruction set, it may also allow computing a small index relative to the address. When used that way, you can think of that as a direct-indexed mode. (Note: Some processors call ‘direct’ mode ‘absolute’, such as the 6502.)

Indirect addressing uses an address held in a register or other location to determine what memory location to read or write. The idea here is that the instruction itself isn’t directly telling you the address to access, but rather indirectly telling the CPU where to find that address. The processor may also allow you to add a small offset to the indirect address, giving an indirect-indexed addressing mode.
Also Read : 5 Best Terminal Emulators for Linux The 6502 one is a little quirky: The 6502 doesn’t have general-purpose registers large enough to store addresses, so i…

What is ASP.NET? and it's ARCHITECTURE

What is ASP.Net?ASP.Net is a web development platform provided by Microsoft. It is used for creating web-based applications. ASP.Net was first released in the year 2002.
The first version of ASP.Net deployed was 1.0. The most recent version of ASP.Net is version 4.6. ASP.Net is designed to work with the HTTP protocol. This is the standard protocol used across all web applications.

ASP.Net applications can also be written in a variety of .Net languages. These include C#, VB.Net, and J#. In this chapter, you will see some basic fundamental of the .Net framework.

The full form of ASP is Active Server Pages, and .NET is Network Enabled Technologies.
ASP.NET Architecture and its Components ASP.Net is a framework which is used to develop a Web-based application. The basic architecture of the ASP.Net framework is as shown below.
 he architecture of the.Net framework is based on the following key components

Language – A variety of languages exists for .net framework. They are VB.n…

What Is Defensive Programming ?

Defensive programming is a form of defensive design intended to ensure the continuing function of a piece of software under unforeseen circumstances. Defensive programming practices are often used where high availability, safety or security is needed. – WikiPedia


Introduction Defensive programming is a form of defensive design intended to ensure the continuing function of a piece of software under under unforeseen circumstances. Defensive programming practices are often used where high availability, safety or security is needed.
Advantages Defensive programming is an approach to improve software and source code, in terms of:
General qualityMaking the source code comprehensibleMaking the software behave in a predictable mannerDrawback Overly defensive programming, however, may safeguard against errors that will never be encountered, thus incurring run-time and maintenance costs. There is also the risk that the code traps or prevents too many exceptions, potentially resulting i…