Forums > Off-Topic Discussion > Bounty Offered To Anyone Who Hacks iPhone Thumb ID

Photographer

Kevin Connery

Posts: 17824

El Segundo, California, US

Lohkee wrote:
Your snarkyness is really uncalled for.

For some reason, people who are hit with snark tend to respond with it.

Strange but true fact.

Sep 21 13 02:13 am Link

Photographer

Kevin Connery

Posts: 17824

El Segundo, California, US

Lohkee wrote:

Wye wrote:
I merely think it borders on the absurd to comment on something nobody has physical access to yet.

I'm pretty sure there are patents one can read to understand how the device works without having one in hand.

True. Have they been examined by the people who have been mocking it here? If not, it's just as absurd to comment.

"Billy-Joe used one of them things once. Dint work a'tall."
"Was that the same model as this one?"
"Naw. Billy-Joe died back in 96. But it was the same darn thing, and it dint work."

Now, it might be the same-old-same-old technology, or have the same weaknesses--and it might not. Give it a couple of days in the field and see what you or other security experts can do with it in real life; or a few days for other specialists to examine the patents and look for flaws. At least then, there'll be some data, and not guesswork.

After all, the usual up-up-down-down-left-right-up kind of holes generally don't surface until a few hours after the product goes into widespread use. (Like the lockscreen hole.)

Sep 21 13 02:21 am Link

Photographer

Robb Mann

Posts: 12327

Baltimore, Maryland, US

Im pretty sure Apple thought they were getting the best tech available when they bought those two security companies, both of which specialized in next-gen fingerprint detection/biometrics.

I know the 5s fingerprint sensor is capactive, so lifting a print with tape isnt going to work. This isnt the same fingerprint reader my 6-year old Latitude has.

I think Apple learned their lesson with iMaps and Siri - no
More beta testing on users. I'll bet this is prime-time ready.

Sep 21 13 04:06 am Link

Photographer

Kincaid Blackwood

Posts: 23492

Los Angeles, California, US

I hear what some of you guys are saying about how quote-unquote useless the fingerprint ID is. I hear what you're saying about how unsecure my information is on that phone and blah blah blah. And, believe me, I enjoy the "back in my day I walked five miles in the snow without shoes to work and hacked the computer network with my frost bitten feet in 3 seconds" penis measuring contest that you gents have going on here. Truly, it's both informative and entertaining.

I'm still going to get a 5S. I'll also use the fingerprint security. And I'll sleep soundly knowing that everything any decent hacker needs to get all of my info is already available to them and if someone is interested in kidnapping me and/or cutting off my finger to steal my iPhone and use it…

…well, I'm comforted knowing that anyone who has an operation to actually pull that off, probably doesn't need to do it to get my funds. They probably already know that there are better targets out there with better credit and more money. And if they are out to screw me, I just had it coming. My email address is already available in a myriad of places online.

I think it's a nice device and great replacement for my 4. I really am not worried about a bunch of goons coming to take my phone and force me to unlock it.

Sep 21 13 05:15 am Link

Photographer

Legacys 7

Posts: 33899

San Francisco, California, US

Jerry Nemeth wrote:

Fingerprint sensors have been around before iPhone 5.  All of our registers have fingerprint sensors which are used for the cashier to sign into the register.  I take their fingerprints and put them into the system.

My H.P. laptop have it too. I use it all the time to log in. Purchased this laptop 3 yrs ago brand new and is in mint condition today.

Sep 21 13 05:40 am Link

Photographer

Lohkee

Posts: 14028

Maricopa, Arizona, US

Kevin Connery wrote:
True. Have they been examined by the people who have been mocking it here? If not, it's just as absurd to comment.

well, yes and no. For those with a background in electronics R & D the answer is probably no, it is not absurd because one can make an educated guess based on their knowledge of what sensors are capable of and what the problems are, for example:

We can measure capacitance, pulse, oxygen levels, etc. The problem here is that all of these things can vary considerably depending on the environment and recent activity. I digress. The potential for false positives (or negatives) forces the engineer to make trade-offs with regard to how data from the sensor should be processed. Too sloppy and people will be unhappy because it doesn't work as expected. Too strict and people will simply not use it because, well, it's not very useful if it continually rejects legitimate users.

This is not a problem unique to Apple by any means. It has been the bane of bio-metric  identification and authentication devices (of all kinds) since they first came out. All of them have been beaten using low-tech inexpensive methods because of the aforementioned limitations.

So, time will tell. It is possible that they have indeed come up with something really different? Sure. Anything is possible, but it's not very likely. If the company that Apple bought really had something truly new (and unbeatable) I would think that it would be worth one hell of a lot more than 350M. All of those three-letter government agencies would be lining up at the door willing to spend a lot more than that lol

One thing I did find very interesting **if** it turns out to be true (and I strongly suspect that it is not), is that Apple is supposedly using the tip of the digit opposed to a regular (flat) print. That could make it one hell of a lot harder to snag someone's print from some object because of the way people tend to hold things. Sometimes a small simple change to an existing approach can be a real game changer. Of course it could also cause problems for the ladies after a trip to the nail salon lol

I'm sorry that you think people are mocking Apple's attempts. I, for one, am not. Nor am I suggesting by any stretch of the imagination that people should not buy an Iphone. As I said in an earlier post, most people will go through life with little or no security on any of their devices and never suffer any serious consequences.

Frankly, I don't really have a dog in this fight. The electronics and system-level programming chapter in my life is now (finally) over and I really like it that way. What's under the hood is no longer of any serious interest to me and I really don't give a rat's ass who makes my gear as long as it does what I want, works when I need it, at a price that I can afford.

My sole purpose in trying to contribute to this thread was to raise awareness with regard to the limitations of technology in general. Had it been some other company, I would have done/said the same as I firmly believe that the customer has a right to make an informed decision opposed to blindly accepting what the marketing department drones want you to believe. I don't see that as a bad thing. Even if Apple's Iphone security is circumvented, does this mean you should not get one? Nope. Not at all. It does mean that you might give a little more thought to what or how you store things on that device. That's all.

Strange as it may seem, I got a free Ipad thingy and, although the interface is really taking some getting used to for a life-long PC guy, I really kind of like it. If I can find an affordable plan, I will seriously considering getting an Iphone because, after playing around with my sister-in-law's for a bit, I really kind of like its interface and level of integration between apps as well. Of course, me being me, I will wait for a bit until the hype dies down and Apple has had a chance to iron out the kinks that are sure to arise with any new product. A good example of this is iOS7. One day after its release and security has already been broken.

Sep 21 13 10:43 am Link

Photographer

NothingIsRealButTheGirl

Posts: 35726

Los Angeles, California, US

Sep 21 13 11:47 am Link

Photographer

Lohkee

Posts: 14028

Maricopa, Arizona, US

NothingIsRealButTheGirl wrote:
They work with nipples

http://kotaku.com/lock-your-new-iphone- … 1360743607

ROTFLMAO! I wonder if the engineers ever considered that possibility. People, if anything, are most certainly creative.

"Honey, can you stick this on your boobie so I can make a call?"

Sep 21 13 11:52 am Link

Photographer

Michael Bots

Posts: 8020

Kingston, Ontario, Canada

It would certainly a cost efficient method of collection --

Senator asks if FBI can get iPhone 5S fingerprint data via Patriot Act
http://arstechnica.com/tech-policy/2013 … triot-act/

"Under American intelligence law, the Federal Bureau of Investigation can seek an order requiring the production of "any tangible thing (including books, records, papers, documents, and other items)" if they are deemed relevant to certain foreign intelligence investigations. See 50 U.S.C. § 1861. Does Apple consider fingerprint data to be "tangible things" as defined in the USA Patriot Act?"

Sep 21 13 01:06 pm Link

Photographer

Lohkee

Posts: 14028

Maricopa, Arizona, US

Michael Bots wrote:
It would certainly a cost efficient method of collection --

Senator asks if FBI can get iPhone 5S fingerprint data via Patriot Act
http://arstechnica.com/tech-policy/2013 … triot-act/

"Under American intelligence law, the Federal Bureau of Investigation can seek an order requiring the production of "any tangible thing (including books, records, papers, documents, and other items)" if they are deemed relevant to certain foreign intelligence investigations. See 50 U.S.C. § 1861. Does Apple consider fingerprint data to be "tangible things" as defined in the USA Patriot Act?"

Given the government can compel the disclosure of data and passwords (or the encryption keys used to protect either) I think the Senator is asking a question that he really already knows the answer to.

Sep 21 13 02:28 pm Link

Photographer

j3_photo

Posts: 19885

Las Vegas, Nevada, US

Lohkee wrote:
A good example of this is iOS7. One day after its release and security has already been broken.

What??

Sep 21 13 03:29 pm Link

Photographer

Tony Lawrence

Posts: 21526

Chicago, Illinois, US

Sep 21 13 03:31 pm Link

Photographer

Lohkee

Posts: 14028

Maricopa, Arizona, US

Sep 21 13 03:32 pm Link

Photographer

j3_photo

Posts: 19885

Las Vegas, Nevada, US

Tony Lawrence wrote:

http://news.yahoo.com/big-ios-7-securit … 27537.html

Fromt the articles "potentially"

from a commenter:
"Siri can be disabled from the lock screen by the user.
2. Control center can be disabled from the lock screen by the user.
3. Turning on Airplane mode does not open up security vulnerabilities in the iPhone.
4. Even if you *can* (*incredibly unlikely*) break into the iPhone before someone locates you using "find my iPhone" you still cannot restore the phone because of the activation lock feature."

It never ends from the haters lol

Sep 21 13 03:35 pm Link

Photographer

Lohkee

Posts: 14028

Maricopa, Arizona, US

j3_photo wrote:
Fromt the articles "potentially"

from a commenter:
"Siri can be disabled from the lock screen by the user.
2. Control center can be disabled from the lock screen by the user.
3. Turning on Airplane mode does not open up security vulnerabilities in the iPhone.
4. Even if you *can* (*incredibly unlikely*) break into the iPhone before someone locates you using "find my iPhone" you still cannot restore the phone because of the activation lock feature."

It never ends from the haters lol

Man, that Apple dog whistle must be very loud. 7 has been broken (Apple has confirmed this and is working on a fix). What's the big deal? Haters? Get a grip man. It is what it is, and it will be fixed. No biggie. Happens to all vendors who roll out a new product.

ETA:

Question: How many times has M$ rolled out fixes for their security "fixes"

Answer Many.


http://techcrunch.com/2013/09/19/ios-7- … l-sharing/

http://www.forbes.com/sites/andygreenbe … r-twitter/


Translation: It's not an Apple issue nor is Apple immune from the issue.

Sep 21 13 03:38 pm Link

Photographer

Lohkee

Posts: 14028

Maricopa, Arizona, US

Robb Mann wrote:
I think Apple learned their lesson with iMaps and Siri - no
More beta testing on users. I'll bet this is prime-time ready.

You might want to rethink your position -

http://techcrunch.com/2013/09/19/ios-7- … l-sharing/

http://www.forbes.com/sites/andygreenbe … r-twitter/



Just sayin'

Sep 21 13 05:21 pm Link

Photographer

Kevin Connery

Posts: 17824

El Segundo, California, US

Lohkee wrote:
Given the government can compel the disclosure of data and passwords (or the encryption keys used to protect either) I think the Senator is asking a question that he really already knows the answer to.

Oddly enough, a fingerprint is considered ineligible for protection under the 5th amendment.

A file protected by a password lets the owner avoid self-incrimination by not providing the password. A file protected by a fingerprint isn't eligible.

Don't know how long that'll last.

Sep 21 13 10:13 pm Link

Photographer

Robert Lynch

Posts: 2550

Bowie, Maryland, US

Lohkee wrote:
Given the government can compel the disclosure of data and passwords (or the encryption keys used to protect either) I think the Senator is asking a question that he really already knows the answer to.

Apple can't give the government something that it doesn't have.  Unless Apple has been telling rather bold lies this week, the fingerprint data never leaves the phone.

Sep 21 13 11:33 pm Link

Photographer

Robb Mann

Posts: 12327

Baltimore, Maryland, US

Lohkee wrote:

You might want to rethink your position -

http://techcrunch.com/2013/09/19/ios-7- … l-sharing/

http://www.forbes.com/sites/andygreenbe … r-twitter/



Just sayin'

Apple is still by far the most stable and secure mobile platform out there, baring possibly RIM, who has found other ways to render itself irrelevant to any but the most paranoid.

Apple is the leader. The king of the hill. The big cheese. The head honcho. Want proof? Look at how aggressively the hacker & hater communities have responded to a simple evolutionary change in the iPhone. Every post you make proves my point more.

Sep 22 13 04:49 am Link

Photographer

Lohkee

Posts: 14028

Maricopa, Arizona, US

Kevin Connery wrote:

Oddly enough, a fingerprint is considered ineligible for protection under the 5th amendment.

A file protected by a password lets the owner avoid self-incrimination by not providing the password. A file protected by a fingerprint isn't eligible.

Don't know how long that'll last.

Well, one appellant court says yes, and another says no, so probably just long enough for the scotus to weigh in. Who knows?

Sep 22 13 05:18 am Link

Photographer

Lohkee

Posts: 14028

Maricopa, Arizona, US

Robert Lynch wrote:

Apple can't give the government something that it doesn't have.  Unless Apple has been telling rather bold lies this week, the fingerprint data never leaves the phone.

I see no reason why Apple would lie about something like that as it would likely be uncovered at some point. I wasn't really referring to apple; rather the individual. Apparently, we now have two appellant courts which have come to opposing conclusions. I suppose that the scotus will have to sort it all out.

Sep 22 13 05:36 am Link

Photographer

Lohkee

Posts: 14028

Maricopa, Arizona, US

Robb Mann wrote:
Every post you make proves my point more.

I'm not sure how on earth you arrived at that conclusion, but whatever trips your trigger I suppose.

ETA: I think you misunderstand where I'm coming from. Who introduced the technology is of little interest to me. I neither like or dislike Apple (well, that's not quite true. The more I use my Ipad gizmo – the first Apple device that I have ever owned - the more I like it. I am most impressed with the battery life. No matter how much I seem to use it the battery has never gone below 75%). My interest is in the print recognition technology per se. Nothing more. Is it really a game changer or a lot of marketing hype?

If proven to be easily bypassed, would this prevent me from getting an Iphone? Not at all. At most it would probably make me consider a little more carefully what I was willing to store on the device. That's about it. Without definitive data one way or the other, I consider the print reader to be more of a user convenience than a meaningful security device (That opinion could obviously change considerably as more hard data becomes available or if Apple decides to open it up to other applications).

Sep 22 13 05:39 am Link

Photographer

Lohkee

Posts: 14028

Maricopa, Arizona, US

Articles have been appearing regarding what the Iphone will allow you to register as a valid “print,” animal paws, various parts of your anatomy, etc. This strongly suggests that Apple is using capacitance (which can produce a higher fidelity image) to image a flat print in addition to (possibly) measuring what else???

This, to me, begs the question: Is it possible to register an **inanimate** object as a “print” and I have not seen anything on this (which is really kind of surprising) being tested as the answer to that question would offer a lot of insight into how the device actually works.

Interesting indeed.


Chuckles: For all of my talk about this (security) chapter of my life being closed, and how much I like it that way, I guess that old dog whistle keeps a callin' and I still fall for it on occasion  lol

Sep 22 13 10:08 am Link

Photographer

Lightcraft Studio

Posts: 13682

Las Vegas, Nevada, US

Lohkee wrote:
Chuckles: For all of my talk about this (security) chapter of my life being closed, and how much I like it that way, I guess that old dog whistle keeps a callin' and I still fall for it on occasion  lol

We do live in interesting times.

Most of us really don't stand to lose much anyway if our phones are compromised. Most of us aren't dumb enough to have our banking passwords on there, our SS number, or things that will really hurt us a whole lot. If you lose your phone some opportunist might manage to run up a huge long-distance bill calling all their relatives on some other country or something, but we'll recover from such an incident.

The much more serious threat of course is the government. We've seen that the government does indeed use the full weight of their resources (NSA, IRS, FCC, and other agencies now) to ruin people and groups based on their political orientation. The public has decided to accept this sort of behavior, so it's currently being expanded and made a permanent part of life. Currently terrorists (and other big-time criminals) can still use their electronic devices without worry, since as we saw with the Boston Bombers, Nidal Hassan, Times Square bomber, and several others, the government isn't concerned with those people. All the government's resources are aimed at political "enemies".

There's little to nothing one can do to avoid being caught up in the government's net in this way, except to simply avoid using these devices all together. Don't bring your GPS enabled device to political meetings, don't discuss your  beliefs via the Internet or the telephone channels. Do everything in person. I understand that the half of the country that supports the current leaders isn't concerned by this sort of thing, but they should be reminded that the political pendulum ALWAYS swings back in the other direction. It's just a matter of time. Since this sort of wholesale use of spying and harassment is now completely acceptable, it's here to stay. It's not inconceivable that a government which is on the other end of the spectrum could take over, and could be just as corrupt as the current one, in which case it would shift its sights to the other groups and ruin their lives in a similar manner.

We're entering new and dangerous times since we have opted to give government this level of power over us. Low-tech solutions (i.e. avoiding electronic communications for doing anything serious) will be the answer for people who at any point in time are on the wrong side of the political fence.

Sep 22 13 11:41 am Link

Photographer

Wye

Posts: 10811

Toronto, Ontario, Canada

Looks like someone's done it.

Sep 22 13 01:04 pm Link

Photographer

Lohkee

Posts: 14028

Maricopa, Arizona, US

Things could get interesting rather quickly. The new banner from the hacking contest website now reads ---

Maybe!
The Chaos Computer Club in Germany may have done it! Awaiting video showing them lifting a print (like from a beer mug) and using it to unlock the phone. If so, they'll win...

http://istouchidhackedyet.com/


From CCC - (Chaos) Indirectly

The only fly in the ointment now is that it looks as though Touch ID isn't "highly secure," after all.

It's perhaps not as futuristic as Apple thought, either: the CCC hackers say that they used a technique documented in CCC materials back in 2004.

Greatly simplified, the fingerprint cloning process works like this:

Take a hi-res (2400dpi) photograph of the fingerprint.
Digitally invert the image so that the valleys of the print are black.
Laser print (1200dpi) the image with a very thick toner setting.
Smear white woodglue (or latex) over the printout and allow to set.
Carefully peel off the glue or latex sheet.
Breathe on the surface so it's slightly moist and conductive.
Unlock phone.
So last decade!


From CCC'c website -

http://www.ccc.de/en/updates/2013/ccc-b … le-touchid

And the video (sort of)

http://www.youtube.com/watch?v=HM8b8d8kSNQ

Sep 22 13 02:16 pm Link

Photographer

Wye

Posts: 10811

Toronto, Ontario, Canada

If they can document it from start to finish then it looks like that's that.

Though I think that, for the huge masses of people who don't bother securing their phone because of the so-called inconvenience, the touch id will be an improvement.

Sep 22 13 02:43 pm Link

Photographer

Lohkee

Posts: 14028

Maricopa, Arizona, US

Wye wrote:
If they can document it from start to finish then it looks like that's that.

Though I think that, for the huge masses of people who don't bother securing their phone because of the so-called inconvenience, the touch id will be an improvement.

Strangely, I agree with both of your comments. Maybe planetary alignment or something lol

I will say this – CCC is not a bunch of script-kiddies. They have a lot of very serious talent and are not given to making false claims. I would be very surprised at this point if they could not deliver the required video (unless the whole thing is an elaborate hoax - in which case I would really hate for the CCC to come after me looking for revenge).   

Wow, one day to break the security of iOS7, and two days to break the thumb print reader. Very impressive if nothing else. I wonder if Apple can get a refund on their 350M?

I feel vindicated.

** does a happy dance **

Sep 22 13 02:44 pm Link

Photographer

Robb Mann

Posts: 12327

Baltimore, Maryland, US

Well, with a 4-digit pin or that swipe-thing android does all someone needs to do is look over your shoulder to steal the passcode for your phone. The amazingly simple method CCC concocted can be easily done in about an hour by any well-organized group of well-supplied and equipped theives. Far easier to steal a pin by shoulder surfing.

First, the fingerprint of the enroled user is photographed with 2400 dpi resolution. The resulting image is then cleaned up, inverted and laser printed with 1200 dpi onto transparent sheet with a thick toner setting. Finally, pink latex milk or white woodglue is smeared into the pattern created by the toner onto the transparent sheet. After it cures, the thin latex sheet is lifted from the sheet, breathed on to make it a tiny bit moist and then placed onto the sensor to unlock the phone. This process has been used with minor refinements and variations against the vast majority of fingerprint sensors on the market.

The fingerprint scanner may not be failsafe, but is is much better than anything else available.

Sep 22 13 04:49 pm Link

Photographer

Lohkee

Posts: 14028

Maricopa, Arizona, US

Robb Mann wrote:
Well, with a 4-digit pin or that swipe-thing android does all someone needs to do is look over your shoulder to steal the passcode for your phone. The amazingly simple method CCC concocted can be easily done in about an hour by any well-organized group of well-supplied and equipped theives. Far easier to steal a pin by shoulder surfing.

Well, yeah, except that you really don't need to be well organized or equipped. A lot of people probably already have everything needed - which is the beauty of it all.

Robb Mann wrote:
The fingerprint scanner may not be failsafe, but is is much better than anything else available.

Not really when you take into account that their "new generation" reader is easily defeated by a very old and low tech attack. Not only is it not failsafe, it's not even particularly that good (from a technical perspective).

I would agree that if it is true most people do not bother to passcode their phones, this is probably a big leap forward in that people will probably try it out of curiosity and then keep on using it for no other reason that they can't be bothered to disable it as using it will just become second nature. Basically, it will fade into the background and they won't even think about it. Given the alternative of having a totally unprotected phone IMHO this is an improvement (of sorts).

Also, I think it important that we keep in mind that Chaos has not yet provided the required video to claim the prize.

Sep 22 13 05:33 pm Link

Photographer

Lohkee

Posts: 14028

Maricopa, Arizona, US

Crap! I swore that I would never do this shit ever again after retiring.

I may have done my happy dance just a little too soon (yep, I really just said that).

I started wandering in my mind and have come to the conclusion that the test/challenge is fundamentally flawed so the results shown in the Chaos teaser video might be bogus. This is not to suggest Chaos cheated. It is clear they did not. Unless I missed something, the dude that registered the print was the same person that used the fake print. If Apple is measuring other parameters, then the attack would obviously work because it would “see” the same person as **all** of the data would be a match. I would have been much happier if the person using the fake print were different than the person who registered the real print.


Simply stated: It's too late to change the rules. It's unlikely, but certainly within the realm of possibility, that they will  have to pay out for a "successful" attack that is in fact worthless because of this flaw lol

(Some of) you folks just **might** get the last laugh. I doubt it, but am certainly open to the possibility.

Thoughts?

Sep 22 13 05:57 pm Link

Photographer

photoimager

Posts: 5164

Stoke-on-Trent, England, United Kingdom

Another report on the hack success:
http://www.bbc.co.uk/news/technology-24203929

Maybe, the people who were adamant about Apple's technology being beyond this and doing things like sensing a pulse in the finger will have their blinkers removed.

Sep 23 13 05:31 am Link

Photographer

Lohkee

Posts: 14028

Maricopa, Arizona, US

photoimager wrote:
Another report on the hack success:
http://www.bbc.co.uk/news/technology-24203929

Maybe, the people who were adamant about Apple's technology being beyond this and doing things like sensing a pulse in the finger will have their blinkers removed.

Please consider the post directly above yours. If the test parameters are flawed as I have suggested, the thumbprint reader **may**, in fact, not be broken at all. I'm keeping an open mind until I see someone use a fake print **other** than the person who registered the original.

Another issue that people may not appreciate is that the security researcher has the home court advantage (and then some).

Suppose that Apple's tech can be defeated in the manner suggested by Chaos. This does not necessarily mean that it is a viable real world attack. As a researcher, I get to control the environment. It is one thing to create a nice clean print and replicate it to bypass the reader as I know what part of the print was registered. The younger folks seem to be amazingly flexible these days. Many hold their phone in one hand and navigate with their thumb (jebus, just watching them text is a sight to behold –  Who ever heard of typing with your thumb fer christ sake? Hell, I'd get a hernia if I even tried to do what appears to be second nature for them). I digress. This suggests that it may be more likely that the side of their thumb would be registered as the print to unlock the phone. Because of the way people hold things, like glasses, stealing a usable print might be damn near impossible. So yes, the reader might well be broken in the technical sense, but this does not necessarily mean an attack conducted in a controlled environment is really all that viable in the real world.

I have demonstrated many attacks, the apparent ease of which, sent management types into a freaking tailspin. The thing is, most were really not a very big deal. It's one thing to launch a successful attack, and quite another to be in a position where you can actually launch it. In all honesty, calming freaked out management types was often far more difficult than designing and demonstrating the actual attacks  lol

Sep 23 13 05:57 am Link

Photographer

Michael Bots

Posts: 8020

Kingston, Ontario, Canada

Another report of hack success - with video


Apple's iPhone 5S fingerprint scanner hacked after just TWO days - using a copy of a print made from a photo
http://www.dailymail.co.uk/sciencetech/ … -days.html



sounds much like the Mythbusters method

Sep 23 13 06:56 am Link

Photographer

photoimager

Posts: 5164

Stoke-on-Trent, England, United Kingdom

Lohkee wrote:
If the test parameters are flawed as I have suggested, the thumbprint reader **may**, in fact, not be broken at all.

Hacked is hacked, irrespective of the parameters. Yes, there are some things and resources that these people have that your standard 'man in the street will have access to. However, that does not change hacked into not hacked.

Sep 23 13 08:47 am Link

Photographer

Lohkee

Posts: 14028

Maricopa, Arizona, US

photoimager wrote:
Hacked is hacked, irrespective of the parameters. Yes, there are some things and resources that these people have that your standard 'man in the street will have access to. However, that does not change hacked into not hacked.

Apparently you did not understand what I was saying. I'll try it again. If Apple is somehow measuring something other than a simple image of the print, then having the same person who registered the print use a fake print to bypass the device is a flawed test. The parameters are indeed critical (for a valid test). So, no, you are dead wrong. Hacked does not necessarily mean hacked.

Sep 23 13 09:05 am Link

Photographer

joeyk

Posts: 14895

Seminole, Florida, US

photoimager wrote:
Hacked is hacked, irrespective of the parameters.

Negative. If, as Lohkee points out, the real registered user is "recognized" by reading other biometric data through the "hack media", then that's not a hack, but a fail of the test...

Sep 23 13 09:15 am Link

Photographer

Lohkee

Posts: 14028

Maricopa, Arizona, US

joeyk wrote:

Negative. If, as Lohkee points out, the real registered user is "recognized" by reading other biometric data through the "hack media", then that's not a hack, but a fail of the test...

Exactly!

Sep 23 13 09:37 am Link

Photographer

Lightcraft Studio

Posts: 13682

Las Vegas, Nevada, US

joeyk wrote:

Negative. If, as Lohkee points out, the real registered user is "recognized" by reading other biometric data through the "hack media", then that's not a hack, but a fail of the test...

Perhaps the phone detected the guy's aftershave or something.

Sep 23 13 09:47 am Link

Photographer

Andialu

Posts: 14029

San Pedro, California, US

I would think that anyone that has information on their iPhone that is so important that someone is willing to go to such extreme measures to get into their phone that they would have other security measures implemented.

Sep 23 13 10:17 am Link