1. Elderly People’s Ankles 2. Characterizing Artifacts of Legacy Security Technology and Their Effects on Modern Applications of Authentication and Authorization 3. Hi.…