, , , , , ,

Hackers bypass Apple’s new Touch ID system

European hacker association Chaos Computer Club claims to have successfully bypassedApple’s Touch ID system included in the just released iPhone 5S “using easy everyday means.”

Well, they claim it’s easy, but the method actually requires a 2400 DPI photograph of someone’s fingerprint from a glass surface, which is then laser printed at 1200 DPI and used to create a thin latex sheet that serves as the fake…

 

sfingerprinthack1

While the hackers claim the method is easy, it’s complicated enough that most iPhone 5S users aren’t as likely to have their security compromised by an everyday thief who would have to be willing to obtain a high-resolution photograph of a fingerprint and produce a physical fake. (It’s also not nearly as easy to bypass Touch ID with this method as, say, fooling Android’s Face Unlock feature with a simple photo of a person). But the method’s relative simplicity, which involves photographing a fingerprint left behind on a surface and then creating a glue model of it, calls the sophistication of Touch ID’s technology into question. Before Touch ID was officially announced, Wired’s Bruce Schneier noted that fingerprint readers have long faced vulnerabilities, and that the simplest readers can be fooled with a good photocopy.

You can get the full details HERE (CCC site).

 

Official Source: http://www.ccc.de/en/updates/2013/ccc-breaks-apple-touchid

http://www.theverge.com/2013/9/22/4759128/chaos-computer-club-biometric-hack-apple-touch-id

http://www.engadget.com/2013/09/22/chaos-computer-club-apple-touch-id-fake-fingerprint/

Facebook Comments

Genius Man Creates Ramen Beard Bowl on His Face

Almost 40% of Xbox Live audience is female