Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Saturday November 02 2019, @04:26AM   Printer-friendly
from the under-your-thumb dept.

Submitted via IRC for AndyTheAbsurd

Hackers Unlock Any Phone Using Photographed Fingerprints In Just 20 Minutes

According to the Chinese blog Abacus, Tencent's X-Lab team showed how this technique works at the recent GeekPwn 2019 hacking conference in Shanghai. X-Lab's leader Chen Yu asked an audience member to touch a glass and took a photo of the fingerprints.

Yu then ran the photo through an app they have developed in house, which extracts and process the necessary data to clone a physical fingerprint. The team didn't show the physical cloning process, but we can assume that they used a 3D printer like other people have done in the past. He then proceeded to use the cloned fingerprint to open three smartphones that had been registered with the audience member's fingerprint — plus two event registration machines that use fingerprint scanners.

[...] Each of those phones used one of the three existing fingerprint scanning technologies: capacitive, optical. and ultrasonic, like the one in the Samsung Galaxy S10. The latter one is especially worrying, since this technology is supposed to avoid this type of hack by scanning the three-dimensional structure of your fingerprint.

[...] In other words: fingerprint security sucks. And facial identification is not that much better, really. If you are really worried about security, the only thing you can do is probably use a longer password.

Still harder than shoulder-surfing or having no password, right?

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2, Interesting) by Anonymous Coward on Saturday November 02 2019, @07:12AM (4 children)

    by Anonymous Coward on Saturday November 02 2019, @07:12AM (#914993)

    One factor authentication, passwords, have not been shown to be able to be effectively bypassed, let alone trivially, in any way, shape, or form. They just require a modicum of intelligence: e.g. - don't make your password dragon1992. I will grant there is the issue of sites being idiots. And while I tend to be very much against regulation, this is one area I think it is entirely appropriate. Any site storing passwords unsalted, let alone in plain text? Screw fines, the punishment is branding "I am an idiot who should never be trusted to run a business" into the forehead of all chief executives, and seizing their company as well. Second violation is where we start to get draconian. That's just so incredibly reckless and negligent in today's digital age. And it takes basically 0 effort to engage in these security precautions which would make literally 100% of password hacks or "leaks" completely irrelevant.

    Biometrics also have a much more insidious downside. They are like SMS messages (which result in giving companies your phone number) on steroids - they are the ultimate tracking mechanism that let companies verify a personal identity which can then be shared/traded/sold with their partners to build a tremendous profile on any given individual across all sites they visit all with 100% certainty that who is being profiled is who they think it is.

    No qualms with things such as RSA generators beyond the fact that they're ultimately useless since basically all sites will allow you to reset your generator even if you lose your generator and your 1-time emergency key for it. If you're not willing to say 'Sorry, tough luck.' when a security device becomes 'unavailable' then that device is not providing security but a false sense of security, and that is perhaps even worse than no security at all.

    Starting Score:    0  points
    Moderation   +2  
       Interesting=1, Informative=1, Total=2
    Extra 'Interesting' Modifier   0  

    Total Score:   2  
  • (Score: 3, Interesting) by Runaway1956 on Saturday November 02 2019, @08:05AM (2 children)

    by Runaway1956 (2926) Subscriber Badge on Saturday November 02 2019, @08:05AM (#915010) Journal

    There's not much point in arguing that passwords are trivial. Instead, just follow the instructions on this page.

    https://smartechverse.blogspot.com/2015/06/crack-windows-admin-password-and-sam.html [blogspot.com]

    I only hang around the outer fringes of the hacking world, but I have cracked dozens of Windows passwords. Hacking and cracking is all well and good, but simple social engineering has given me other passwords. Your recognition that idiots operate sites makes it clear that passwords can be "cracked" by means that don't require access to the computer, or the system on the computer, or even access to the victim. Ahhhh, the beauty of the cloud!!

    We need to remember that passwords, and the security that they provide, is just an arms race. Someone dreams up an "unbreakable" password scheme, and someone else breaks the scheme, then the first person attempts to close up the vulnerability, and some third person comes along and opens up a new vulnerability.

    In and of itself, a password can be "good enough" for most of our purposes. But, today, the NSA does indeed trivially break many if not most passwords. If the NSA has to devote significant resources to crack a password, then yeah, you have a pretty good password - but the NSA's resources grow and improve every year.

    I insist that passwords alone aren't enough, if you're really serious about security. 2fA and 3fA are either necessary today, or they will soon become necessary. Those who are NOT serious about security may disregard all of the above.

    • (Score: 0) by Anonymous Coward on Saturday November 02 2019, @06:49PM (1 child)

      by Anonymous Coward on Saturday November 02 2019, @06:49PM (#915076)

      This is wrong. Passwords are the best form of security overall, as long as they are implemented properly. There is no "arms race," not really. Passwords are as strong as the implementation they use, sometimes the implementation is weak. Good implementations are well understood and available freely. While many hashing functions eventually get broken, this comes with literally years of advance warning, making it easy to upgrade the hash.

      The biggest problem with passwords is the reuse of weak passwords, which requires the user to break two of the three characteristics that make up a good authentication factor for the sake of their convenience. System builders insisting on passwords that are easy for computers to break but hard for humans to remember is part of the problem as this encourages users to do just that.

      Even if you assume that password databases are always stolen, which isn't even a terrible assumption, they are still better than biometrics, which are equally easily stolen, except that a breach of your biometric data permanently breaks it forever no matter what you do. It's the same as if, after someone stole your password, instead of having to change it, you had to use that same password everywhere for the rest of your life.

      • (Score: 2) by Runaway1956 on Saturday November 02 2019, @07:02PM

        by Runaway1956 (2926) Subscriber Badge on Saturday November 02 2019, @07:02PM (#915082) Journal

        Wait a second, please. Let me be clear that I have NOT claimed that biometrics are somehow better than passwords. My only claim here, is that using both biometrics and a good password will improve your security. If I were to compare the relative virtues of biometrics and passwords, I would have to say that passwords are almost certainly better. As you say, don't use a weak password.

        The near ultimate security scheme? Biometrics unlocks the screen, which immediately asks you to enter your password. That is, no one should ever get to the log-in screen before the system screens them biometrically. Password taken care of - you're asked for your dongle thingie, whether it be a chip card, USB key, or whatever. Three factor authentication, and if you can't get one of the three, you don't get in.

        For the really ultimate in security, 3 successive failed attempts to access the system results in the device melting down irrecoverably. That was a concern when the FBI was trying to get into the phone from the Inland shooting incident.

  • (Score: 2) by vux984 on Saturday November 02 2019, @11:34PM

    by vux984 (5045) on Saturday November 02 2019, @11:34PM (#915158)

    "No qualms with things such as RSA generators beyond the fact that they're ultimately useless since basically all sites will allow you to reset your generator even if you lose your generator and your 1-time emergency key for it."

    This is pretty much it right here.

    That said...

    One factor authentication, passwords, have not been shown to be able to be effectively bypassed, let alone trivially, in any way, shape, or form.

    Well, except for all the truly shitty I forgot my password reset systems out there.