|
|
Line 218: |
Line 218: |
| </div> | | </div> |
| <div class="col-md-6 css-img-wrapper hidden-xs hidden-sm"> | | <div class="col-md-6 css-img-wrapper hidden-xs hidden-sm"> |
− | <img src="https://static.igem.org/mediawiki/2017/archive/b/b0/20171026145318%21T--UNOTT--openlock.png" class="img-responsive img-circle img-designers"> | + | <img src="https://static.igem.org/mediawiki/2017/e/e4/T--UNOTT--ourkey.png" class="img-responsive img-circle img-designers"> |
| </div> | | </div> |
| </section> | | </section> |
Line 229: |
Line 229: |
| <div class="col-md-6 css-img-wrapper hidden-xs hidden-sm"> | | <div class="col-md-6 css-img-wrapper hidden-xs hidden-sm"> |
| <div> | | <div> |
− | <img src="https://static.igem.org/mediawiki/2017/e/e4/T--UNOTT--ourkey.png" class="img-circle img-responsive img-developers"></div> | + | <img src="https://static.igem.org/mediawiki/2017/8/89/UNOTT2017-propagandascript.png" class="img-circle img-responsive img-developers"></div> |
| </div> | | </div> |
| <div class="col-md-6"> | | <div class="col-md-6"> |
Line 237: |
Line 237: |
| Major hacking incidents are increasingly common, with accounts being hacked and sensitive information stolen. Many companies are moving away from conventional passwords, which are proving to be unreliable in the hands of the public. Banks are now using physical biometric authentication procedures to correctly identify account owners. This new direction opens a market for biological “passwords”. An ideal system would be as separate from online software programs as possible, while maintaining the complexity and uniqueness of a biometric system. Cells are effectively living computers, so we can programme cells to act as a changeable biometric password. | | Major hacking incidents are increasingly common, with accounts being hacked and sensitive information stolen. Many companies are moving away from conventional passwords, which are proving to be unreliable in the hands of the public. Banks are now using physical biometric authentication procedures to correctly identify account owners. This new direction opens a market for biological “passwords”. An ideal system would be as separate from online software programs as possible, while maintaining the complexity and uniqueness of a biometric system. Cells are effectively living computers, so we can programme cells to act as a changeable biometric password. |
| </p> | | </p> |
− | <img src="https://static.igem.org/mediawiki/2017/8/89/UNOTT2017-propagandascript.png" class="img-circle img-responsive img-developers"></div>
| + | </div> |
| | | |
| <p> | | <p> |