To: dayglored; ShadowAce; ThunderSleeps; ~Kim4VRWC's~; 1234; Abundy; Action-America; acoulterfan; ...
Smartphone fingerprint scanners fooled by inkjet printerMichigan State University. Apple iPhone 5S, 6, and 6S and iPad users, don't worry. It doesn't work on Apple fingerprint scanners. It only works on Android phone scanners. They list Huawei Honor 7 and Samsung Galaxy S6, as ones that can be opened with a inkjet printer and capacitance ink. If the San Bernardino Terrorists had been using one of those the FBI would have been in the phone in 10 minutes. PING! Pinging dayglored, Shadow Ace, and ThunderSleeps for your Ping lists to warn Android users with fingerprint security that it ain't safe.
Android Finger Print Security Spoofed with inkjet Printers
Ping!
The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.
If you want on or off the Mac Ping List, Freepmail me
2 posted on
03/08/2016 7:36:11 PM PST by
Swordmaker
(This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
To: Swordmaker
Exact terms escape me, but there’s a difference between credentials (known info others are unlikely to supply) vs passcodes (secrets which only the authorized should know). Fingerprints are considered the former a la speed bumps for security, not impenetrable secrets a la 1024 bit RSA keys.
3 posted on
03/08/2016 8:20:05 PM PST by
ctdonath2
(History does not long entrust the care of freedom to the weak or the timid. - Ike)
To: Swordmaker
OK.... lets see:
The researchers began by taking high-resolution scans of the smartphone owners fingerprint, then printing it onto conductive paper using AgIC conductive ink. So - the nefarious party must have your finger or fingerprint, then must scan that fingerprint (the actual resolution or how much detail must be included is mentioned). THEN - they must have a printer that prints in conductive ink (definitely not a normal, consumer-available product), then must print out several copies to be able to try them out. Certainly within the means of someone after some truly high-value data.
But I"m also curious - what makes Apple's implementation so much more secure?
16 posted on
03/10/2016 10:15:37 AM PST by
TheBattman
(Isn't the lesser evil... still evil?)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson