German hacker Starbug tells Ars how he bypassed the fingerprint lock on new iPhones.
Read the whole story
Read the whole story
He's right about that.On the other hand, today's smartphones contain a great amount of personal data where many would say that even a four-digit [PIN] is also insufficient.
[url=http://meincmagazine.com/civis/viewtopic.php?p=25358379#p25358379:d50cwbbi said:metalliqaz[/url]":d50cwbbi]These are old, well-known attacks on fingerprint scanning. Similar techniques are known to exist on everything from the Thinkpad scanner to commercial lock systems. My question is, why is anyone surprised that fingerprint duplication techniques work on the new iPhone?? It's a gimmick feature built into a cellphone at the lowest possible cost. It also requires that attackers obtain your fingerprint. If they are doing that without your knowledge then you have more to worry about than your text messages...
[url=http://meincmagazine.com/civis/viewtopic.php?p=25358379#p25358379:ur3krixv said:metalliqaz[/url]":ur3krixv]These are old, well-known attacks on fingerprint scanning. Similar techniques are known to exist on everything from the Thinkpad scanner to commercial lock systems. My question is, why is anyone surprised that fingerprint duplication techniques work on the new iPhone?? It's a gimmick feature built into a cellphone at the lowest possible cost. It also requires that attackers obtain your fingerprint. If they are doing that without your knowledge then you have more to worry about than your text messages...
[url=http://meincmagazine.com/civis/viewtopic.php?p=25358413#p25358413:30jn86ze said:fuzzzerd[/url]":30jn86ze][url=http://meincmagazine.com/civis/viewtopic.php?p=25358379#p25358379:30jn86ze said:metalliqaz[/url]":30jn86ze]These are old, well-known attacks on fingerprint scanning. Similar techniques are known to exist on everything from the Thinkpad scanner to commercial lock systems. My question is, why is anyone surprised that fingerprint duplication techniques work on the new iPhone?? It's a gimmick feature built into a cellphone at the lowest possible cost. It also requires that attackers obtain your fingerprint. If they are doing that without your knowledge then you have more to worry about than your text messages...
You had me agreeing with you until you said "it also requires the attackers obtain your fingerprint." -- Your phone has your fingerprints all over it. It only requires that the attacker has possession of your phone.
[url=http://meincmagazine.com/civis/viewtopic.php?p=25358481#p25358481:gloib4a3 said:jxmzsr[/url]":gloib4a3][url=http://meincmagazine.com/civis/viewtopic.php?p=25358413#p25358413:gloib4a3 said:fuzzzerd[/url]":gloib4a3][url=http://meincmagazine.com/civis/viewtopic.php?p=25358379#p25358379:gloib4a3 said:metalliqaz[/url]":gloib4a3]These are old, well-known attacks on fingerprint scanning. Similar techniques are known to exist on everything from the Thinkpad scanner to commercial lock systems. My question is, why is anyone surprised that fingerprint duplication techniques work on the new iPhone?? It's a gimmick feature built into a cellphone at the lowest possible cost. It also requires that attackers obtain your fingerprint. If they are doing that without your knowledge then you have more to worry about than your text messages...
You had me agreeing with you until you said "it also requires the attackers obtain your fingerprint." -- Your phone has your fingerprints all over it. It only requires that the attacker has possession of your phone.
actually, they don't need your phone to get the fingerprint... anything that you touched that has your fingerprints on it and if the print can hold "fingerprint powder" would work. Get a toner cartridge from a photocopy machine, get some of the toner from it, mix in a small amount of some very finely crushed graphite (use standard lock graphite and just grind it up a little more) and you have a good fingerprint powder. Spread a little on a fingerprint on something the target touched and take a picture, feed it into some photo software and remove the background, then do the rest of what's in the video after the phone scan part. You end up with the same thing. That's how a person in a case of ours managed to bypass a biometric fingerprint scanner lock at a residence.
[url=http://meincmagazine.com/civis/viewtopic.php?p=25358505#p25358505:35nufwc2 said:fuzzyfuzzyfungus[/url]":35nufwc2]and because the fanboys trotted out a rather hysterical line of nonsense about how this time fingerprint reading was totally going to be insanely secure and stuff
[url=http://meincmagazine.com/civis/viewtopic.php?p=25358521#p25358521:p4dq0wjk said:bkieffer[/url]"4dq0wjk]"Trivial."
Provided I know which part of which finger, have the phone, a computer, a scanner, a PCB etching kit, a decent print, a decent amount of time, and the phone's owner doesn't know.
Either I don't know what trivial means, or he doesn't.
[url=http://meincmagazine.com/civis/viewtopic.php?p=25358513#p25358513:2b8y0blt said:i_am_suseJ[/url]":2b8y0blt]this is so silly. Of course a silicone based, printer copy of a fingerprint will be able to replicate the original. LETS BE HONEST here people, i'm not trying to hide my fingerprint, its simply a deterrent to the average friend or peer.
[url=http://meincmagazine.com/civis/viewtopic.php?p=25358547#p25358547:299joocg said:paradox00[/url]":299joocg][url=http://meincmagazine.com/civis/viewtopic.php?p=25358481#p25358481:299joocg said:jxmzsr[/url]":299joocg][url=http://meincmagazine.com/civis/viewtopic.php?p=25358413#p25358413:299joocg said:fuzzzerd[/url]":299joocg][url=http://meincmagazine.com/civis/viewtopic.php?p=25358379#p25358379:299joocg said:metalliqaz[/url]":299joocg]These are old, well-known attacks on fingerprint scanning. Similar techniques are known to exist on everything from the Thinkpad scanner to commercial lock systems. My question is, why is anyone surprised that fingerprint duplication techniques work on the new iPhone?? It's a gimmick feature built into a cellphone at the lowest possible cost. It also requires that attackers obtain your fingerprint. If they are doing that without your knowledge then you have more to worry about than your text messages...
You had me agreeing with you until you said "it also requires the attackers obtain your fingerprint." -- Your phone has your fingerprints all over it. It only requires that the attacker has possession of your phone.
actually, they don't need your phone to get the fingerprint... anything that you touched that has your fingerprints on it and if the print can hold "fingerprint powder" would work. Get a toner cartridge from a photocopy machine, get some of the toner from it, mix in a small amount of some very finely crushed graphite (use standard lock graphite and just grind it up a little more) and you have a good fingerprint powder. Spread a little on a fingerprint on something the target touched and take a picture, feed it into some photo software and remove the background, then do the rest of what's in the video after the phone scan part. You end up with the same thing. That's how a person in a case of ours managed to bypass a biometric fingerprint scanner lock at a residence.
They do need your phone. What good is a fingerprint, with no fingerprint reader to bypass? You're right that your fingerprint can be lifted elsewhere, but for the purposes of this discussion, they need to be in physical possession of your phone anyway.
[url=http://meincmagazine.com/civis/viewtopic.php?p=25358521#p25358521:2v81ngnm said:bkieffer[/url]":2v81ngnm]"Trivial."
Provided I know which part of which finger, have the phone, a computer, a scanner, a PCB etching kit, a decent print, a decent amount of time, and the phone's owner doesn't know.
Either I don't know what trivial means, or he doesn't.
[url=http://meincmagazine.com/civis/viewtopic.php?p=25358551#p25358551:2615zt9f said:arcadium[/url]":2615zt9f]
Heck, even Apple hasn't been selling it as a security solution, but as being more secure than the 50% who dont have any security on their phone whatsoever.
[url=http://meincmagazine.com/civis/viewtopic.php?p=25358599#p25358599:1flmuopt said:drouu[/url]":1flmuopt]The obvious solution is to use a biometric print which you don't leave all over the place, and this explains the interest in using nipples and the like.
[url=http://meincmagazine.com/civis/viewtopic.php?p=25358281#p25358281:hjdaxp0n said:jandrese[/url]":hjdaxp0n]I love how every time there is a new fingerprint reader out, the manufacturer claims that "This one won't be defeated by a simple printer! We now analyze below the skin and measure heartbeats and check your blood's personality before unlocking!"
Then it is defeated by the guy with the fingerprint kit and printer again. Every time.
I literally said to myself "I've heard that before" when Tim Cook talked about the fingerprint reader during the liveblog.
That said, Apple's message has shifted from "it's security" to "it convinces more people to turn on the basic security features of their phone", which I guess is true but probably could have been achieved by simply having them enabled by default and have you set a pin when you first setup your phone.
I wasn't actually able to find sufficient details on how the sensor works. I do assume they use sub-epidermal scanning. However, the scanned tissue is too similar to the upper layers of the skin. The most likely issue is the arbitrary threshold that Apple chose. They had to ensure that their setting works reliably, i.e. it shouldn't need to scan his finger twice because the sensor rejected the first attempt. Put simply, they chose usability and convenience over security. Hence, the fingerprint sensor can always be defeated as long as the materials used for the fake are sufficiently close to the characteristics of human tissue, and as long the scan of a high-resolution fingerprint is available.
[url=http://meincmagazine.com/civis/viewtopic.php?p=25358553#p25358553:1dlfq663 said:a_v_s[/url]":1dlfq663][url=http://meincmagazine.com/civis/viewtopic.php?p=25358521#p25358521:1dlfq663 said:bkieffer[/url]":1dlfq663]"Trivial."
Provided I know which part of which finger, have the phone, a computer, a scanner, a PCB etching kit, a decent print, a decent amount of time, and the phone's owner doesn't know.
Either I don't know what trivial means, or he doesn't.
Perhaps trivial in this context is referring to someone that practices in the art.
For example, I think the concept of generics and lambdas to be trivial, but I'm pretty sure if I explained it to some of my non-engineering friends, they wouldn't have the foggiest clue what I'm talking about.
[url=http://meincmagazine.com/civis/viewtopic.php?p=25358619#p25358619:38usrbl5 said:dangoodin[/url]":38usrbl5][url=http://meincmagazine.com/civis/viewtopic.php?p=25358551#p25358551:38usrbl5 said:arcadium[/url]":38usrbl5]
Heck, even Apple hasn't been selling it as a security solution, but as being more secure than the 50% who dont have any security on their phone whatsoever.
Apple's on press release called Touch ID a "secure" way to unlock the iPhone. https://www.apple.com/pr/library/2013/0 ... World.html
[url=http://meincmagazine.com/civis/viewtopic.php?p=25358631#p25358631:24ztqh56 said:bkieffer[/url]":24ztqh56]
Get back to me when he's able to take a phone hasn't been in control of, and get by using a fingerprint he hasn't himself set. Then I'll concede to the triviality of this "hack"