iPhone Fingerprint Hack Contest Dangles $18,000 - InformationWeek
IoT
IoT
Comments
iPhone Fingerprint Hack Contest Dangles $18,000
Newest First  |  Oldest First  |  Threaded View
hlubinv8l
50%
50%
hlubinv8l,
User Rank: Strategist
9/22/2013 | 9:06:22 PM
re: iPhone Fingerprint Hack Contest Dangles $18,000
There is a video today of someone supposedly "hacking" the Touch ID... but it's the same guy who registered his fingerprint that "unlocks" his iphone with something on his fingertip.

Even if you have thick chapped skin on your fingertips, the Touch ID will still recognize you because it reads your sub-dermal prints.

Of course he is going to unlock his own phone, because the Touch ID does not read the surface, but scans below the outer skin to recognize him as the owner.

Duh!!!

We need to see another person who has NOT registered his fingerprints on this phone, using the registered person's printed fingerprint. But the guy who made this video obviously knew that wouldn't work. ;-))

Here is some information about the deep scanning that Touch ID does, and why printing a fingerprint, or using a severed finger will NOT work:

Capacitive -- A capacitive sensor is activated by the slight electrical charge running through your skin. We all have a small amount of electrical current running through our bodies, and capacitive technology utilizes that to sense touch. This is also the same technology used in the iPhone's touchscreen to detect input.

Radio frequency -- RF waves do not respond to the dead layer of skin on the outside of your finger -- the part that might be chapped or too dry to be read with much accuracy -- and instead reads only the living tissue underneath. This produces an extremely precise image of your print, and ensures that a severed finger is completely useless.

This video only proves that Touch ID can still recognize your fingerprint, even if you have something thin between you and the scanner.

This guy is not winning the contest, but nice try to fake things. ;-))


How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll