Posted on 12/02/2014 2:44:39 PM PST by aquila48
While weve been reading about elaborate hacks of Apples Touch ID fingerprint identification system for more than a year now, one clever 7-year-old boy has figured out the simplest way to bypass the system without knowing one line of code. CNN Monday reports that Harrison Green, the 7-year-old son of Johns Hopkins University professor Matthew Green, smartly snuck into his fathers room while he was asleep and...
(Excerpt) Read more at yahoo.com ...
Yea it’s really a no win situation.
I would rather just use a passcode, or just don’t keep anything more important than my appendages on my phone.
I don’t understand people who like to appoint themselves posting police. I understand that sometimes people get out of hand but I’ve seen jerks attack other conservative bloggers as if the idea that someone dare think a conservative site like Freerepublic just might be a good place to link interesting stuff. People then wonder why leftists dominate media and academia.
All governments have, or will soon have, full biometric data on everyone.
The best way to get around fingerprint biometrics is to learn that courts have now ruled that you have no right to fingerprint privacy - only password privacy.
Let the ramifications of that sink in for a moment, and then see if the technology is still appealing.
If you want on or off the Mac Ping List, Freepmail me.
Uh, boogieman, I think I've told you before. It doesn't work with a dead finger. It only works with a living finger! Nice try.
TouchID will not work with a dead finger. It isn't using the fingerprint.
Sorry, nice try. Won't work. It requires the original live finger. Not a reasonable facsimile. It is not reading the fingerprint.
No, the "courts" have not so ruled. A single state judge ruled in a non-precedent setting case so "ruled." It is actually likely his ruling will be set aside because his logic and case law are very shaky.
The DOJ is reaching back to an equally shaky 18th century "all writs" holding to attempt to require manufacturers to provide assistance in opening secure devices.
Still dreaming that your Apple is invulnerable?
> “Won’t work.”
By your utterance you reveal yourself to be naive in the field of security.
> “It requires the original live finger. Not a reasonable facsimile.”
Easy to make the gelatine membranes so thin, thinner than plastic wrap over one’s finger tip that the conductivity and pulsing scores positive in a “live” test. The gelatine method in the link (http://www.puttyworld.com/thinputdeffi.html) has been adapted from a process of creating ultra thin membranes to be worn over the finger tip. Such ultra thin finger tip membranes were tested years ago by security contractors for intelligence services using live scores and statistical analysis. Conductivity, temperature and motion detection (pulsing) sensor measurements processed through a statistical algorithm, these elements have been around a very long time now. Apple thinks they are doing something new; they are not and worse they are misrepresenting themselves as creators of something new when in fact what they are doing has been around for decades and is a proven failure.
This amateur techie approach that Apple has adopted is not new and was demonstrated long ago to be easily hacked. Apple is perpetuating a scam illusion of security because they are stupid and foolish or needing to cover their wrong decision making (the one I believe), and too proud to admit it as well as having investors too invested for them to back out now.
> “It is not reading the fingerprint.”
And now your foolishness is on display for everyone reading here. Of course it’s reading the fingerprint else anyone’s ‘live’ finger could be used. Really how stupid do you think people are? Of course it is reading the fingerprint. But you won’t admit your buffoonery because you are far too enamored with your delusion. Your entrenchment into your fantasy of invulnerability renders it impossible for you to wake up and learn something. This is not a child’s game here.
There are other easy ways to defeat Apple’s scan security or that of any similar electronic maker for new phone scanners or reset phone scanners by making use of a child’s finger or that of an unsuspecting person with dementia or other debilitating illness followed by a reset to repeat the hack with new unsuspecting persons. The technology is a fail on a number of levels falling far short of professional security standards.
Apple’s security is a bad stupid joke and its presentation is a scam perpetuated by very foolish sales people. It is insulting to security professionals.
This why I use my big toe! Of course it gets a little awkward in resteraunts.
The main screen doesn’t seem to work with my left thumb when my hands are real cold either.
Was hiking and camping in weather around freezing. Would pull the phone out of my pocket with my left hand and flick the slide with my thumb - then nothing when using my left thumb. Would have to use my right hand pointer finger and it worked fine.
It's exactly the same as claiming that because you stole a co-worker's keys from his jacket pocket and unlocked his car door, that somehow you had "defeated the security of the car lock". What a crock of cr@p.
This kid used the TouchID in exactly the way it is intended to be used -- with regard to the phone's security. The fact that it wasn't his own finger-phone pair is the only cute facet of an otherwise inane article.
This article doesn't address security. It addresses "Kids Do The Darndest Things". And nothing more.
What is the pinky good for besides my two carat diamond ring?
“They did this in National Treasure”
In that movie they used a fingerprint taken from a glass.
What if you hook up some electrodes and make it twitch like the frog legs in science class?
Just clench your fist and feel where the power is coming through.
A Dr. actually did an Articke on this which is why the thought came to mind when I saw the thread.
I remember thinking how much I hope I don’t ever gave to make the decision of which finger to let go of.
Ouch!
What rot. If you get arrested your fingerprints are automatically taken without conviction. Your passwords are not. There's nothing shaky about it. If you think the government is going to adjudicate itself out out access to the biometrics contained in the body they believe they are empowered to seize and jail on suspicion of a crime, you're dreaming.
Have you ever thought that I've READ the technical description of exactly how TouchID does work, Hostage? You are again totally a ignoramus about this. I am not, because I DID read the patents and the technical papers. Your idiotic link was from Pre-TouchID technology, Hostage. It's copyright 2013. It assumes all you have to do is replicate the ridges of a fingerprint. . . nothing about TouchID is so gross an approach. That was the approach Samsung used. . . and failed.
You, sir, are the Buffoon. You assume it is reading a fingerprint but it is actually reading subcutaneous data not represented in a fingerprint. That is why an image of a mere fingerprint WILL NOT WORK. . . nor will the idea of anyone else's finger inside a copied print of the target person. The one person who THOUGHT he had spoofed it was using a copy of his own print on the same finger He had copied and the TouchID was reading his real finger data through the photocopy! Again, Hostage, I read the technical analysis, not the breathless popular press. Lots of people have been trying for over a year to defeat this system. . . and not succeeding.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.