Forums >
Off-Topic Discussion >
Bounty Offered To Anyone Who Hacks iPhone Thumb ID
Andialu wrote: You would think so but, given the sheer volume of identity theft, it doesn't seem very likely. Sep 23 13 12:40 pm Link Lohkee wrote: Your garden variety ID theft comes from opportunists exploiting careless people. This is different. It is more labor intensive. Why go to all the trouble unless you know the phone you are trying to hack has valuable information on it? Sep 23 13 12:43 pm Link Andialu wrote: well, it's really not a lot of effort. But each to his own. As Kristofferson said an long time ago, "we take our own changes and pay our own dues, that silver tongued devil and I" (or some such thing). Sep 23 13 01:28 pm Link Well, next time Im at a bar and the guy/gal next to me has a camera, a laptop, a laser printer, sheets of latex and woodglue im going to keep a close eye on them and my phone. Sep 23 13 02:46 pm Link Robb Mann wrote: Sep 23 13 02:47 pm Link Robb Mann wrote: That would be Batman (Adam West version) and his Utility Belt. Sep 23 13 04:07 pm Link ok. This old school hacker is going to jump in here for a moment. How old school? hmm... I grew up learning Pascal, Fortran, Basic and COBOL. Old enough? I'm with Lohkee. Hacked isn't hacked. Just because you can split an atom in a lab, doesn't mean you can do it in a nuclear warhead. Don't believe me. Just ask the guys who figured that out during WWII. When I see it happen in the real world I will believe it's possible. Collecting a viable fingerprint is more difficult than you think, especially when you've no idea which part of the finger or for that matter which finger was registered. Andialu wrote: Do you mean like a cheating spouse who hides emails and photos? Robb Mann wrote: I don't see that as much of a problem. It's much easier to simply steal someone's beer bottle! Sep 23 13 06:30 pm Link The real question is, what will the CCC do with their bounty? Sep 24 13 02:27 pm Link Mine came in today, and after playing with it. It actually works very well. Sep 24 13 08:59 pm Link Greg Holt Photography wrote: I'm still curious if Apple is using a simple image of the print or measuring other biometric data (can you register an inanimate object?). Sep 24 13 11:31 pm Link I tried a couple of things as suggested, none of them worked, the sensor didn't even register anything was there. I even tried a quick and dirty finger print mold with some cooled down "hot glue".No dice. Other bits of skin, palm, knuckles, (as a few articles pointed out, nipples) work fine. I'm sure with some plat-sil or liquid latex you could make a cheap working mold. The way I see it , this helps (but not cures) basic social engineering. Iphones only require a 4 digit unlock code. Which is very easily seen by shoulder surfers. This makes you a "little bit" more secure from that type of event. And after owning it and playing with it, I don't see it as a security feature as much a convenience. Its quicker and easier than typing in your pin every single time you want to open your phone. Sep 25 13 12:45 am Link Thank you. Sep 25 13 06:49 am Link Sep 25 13 08:25 am Link Sep 25 13 01:18 pm Link |