Is Biometrics Fit for KYC?

By Debesh Choudhury | TechFuture | 12 Apr 2024

Biometrics is convenient but lowers security.

Biometrics recognition is inherently probabilistic and can't yield deterministic "yes/no" results like text passwords/PINs.

I created a GIF using the title text and an image by

Biometrics may compromise security.



Biometrics is not a fallacy but can lower security.

As a longtime, hands-on researcher of biometric recognition technology, I can unhesitatingly comment that biometrics recognition is unreliable and that biometrics lowers security.



Security threats of biometrics rendered Aadhaar a broken digital identity system

How can people forget/ignore the continual fraudulent money looting by criminals using fingerprint spoofs and Aadhaar-enabled payment systems for the last seven-plus years?

It is a significant failure of the team Aadhaar.

The credit (discredit) of money looting by the criminals using fingerprint spoofs and Aadhaar-enabled Payment Systems goes to the advisers of the Aadhaar project and courtesy security-lowering traits of biometrics.



Biometrics is convenient but lowers security.

Digital KYC is the easiest way for fraudsters to create fake bank accounts worldwide. However, there is a rise in digital KYCs because of convenience.


I created a GIF using my texts and pictures from the Internet.

Biometrics is convenient but lowers security.



Biometrics is NOT fit for authentication and KYC.

If an authentication factor doesn't give us the confidence for reliable authentication, how can it serve as an instrument for KYC verification?

Therefore, biometrics recognition is inherently security-vulnerable for KYC verification.



<> Originally published in my LinkedIn Newsletter.



About me

I am a researcher and contribute to the overlapping areas of STEAM (Science, Technology, Engineering, Arts, and Mathematics). I am an active user and promoter of GNU/Linux, free and open-source software. I develop cybersecurity and information security solutions, specifically graphical authentication security.




Debesh Choudhury

Text Copyright © 2024 Debesh Choudhury — All Rights Reserved

Join me at

YouTube, Twitch, CashRain, Odysee, LinkedIn, Twitter, Publish0x, ReadCash, and Facebook.

Earn passive income by sharing unused Internet bandwidth with Grass, Honeygain and Peer2Profit.

Cover Image: I created a GIF using an image from the news and a phI created a GIF using my texts and pictures from the Internet..

All other images are either drawn/created/screenshots by myself or credited to the respective artists/sources.

Disclaimer: All texts are mine and original. Any similarity and resemblance to any other content are purely accidental. The article is not advice for life, career, business, or investment. Please do your research before you adopt any options.

Unite and Empower Humanity.

authentication kyc biometrics security privacy threats dataprivacy cybersecurity passwordsecurity passwords

How do you rate this article?


Debesh Choudhury
Debesh Choudhury

I am a solution architect for Digital Identity, Data Privacy, Password & Cybersecurity, Distributed Ledgers, IoT, a researcher & academician of Electronics, Computer Eng. & IT, an Entrepreneur & Tech Blogger.


TechFuture will publish short articles on future technologies that will make the world a better place to live. It will include digital identity, data privacy, passwords & cybersecurity, cryptocurrencies, and many more.

Send a $0.01 microtip in crypto to the author, and earn yourself as you read!

20% to author / 80% to me.
We pay the tips from our rewards pool.