Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Saturday November 02 2019, @04:26AM   Printer-friendly
from the under-your-thumb dept.

Submitted via IRC for AndyTheAbsurd

Hackers Unlock Any Phone Using Photographed Fingerprints In Just 20 Minutes

According to the Chinese blog Abacus, Tencent's X-Lab team showed how this technique works at the recent GeekPwn 2019 hacking conference in Shanghai. X-Lab's leader Chen Yu asked an audience member to touch a glass and took a photo of the fingerprints.

Yu then ran the photo through an app they have developed in house, which extracts and process the necessary data to clone a physical fingerprint. The team didn't show the physical cloning process, but we can assume that they used a 3D printer like other people have done in the past. He then proceeded to use the cloned fingerprint to open three smartphones that had been registered with the audience member's fingerprint — plus two event registration machines that use fingerprint scanners.

[...] Each of those phones used one of the three existing fingerprint scanning technologies: capacitive, optical. and ultrasonic, like the one in the Samsung Galaxy S10. The latter one is especially worrying, since this technology is supposed to avoid this type of hack by scanning the three-dimensional structure of your fingerprint.

[...] In other words: fingerprint security sucks. And facial identification is not that much better, really. If you are really worried about security, the only thing you can do is probably use a longer password.

Still harder than shoulder-surfing or having no password, right?

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Interesting) by Runaway1956 on Saturday November 02 2019, @08:05AM (2 children)

    by Runaway1956 (2926) Subscriber Badge on Saturday November 02 2019, @08:05AM (#915010) Journal

    There's not much point in arguing that passwords are trivial. Instead, just follow the instructions on this page.

    https://smartechverse.blogspot.com/2015/06/crack-windows-admin-password-and-sam.html [blogspot.com]

    I only hang around the outer fringes of the hacking world, but I have cracked dozens of Windows passwords. Hacking and cracking is all well and good, but simple social engineering has given me other passwords. Your recognition that idiots operate sites makes it clear that passwords can be "cracked" by means that don't require access to the computer, or the system on the computer, or even access to the victim. Ahhhh, the beauty of the cloud!!

    We need to remember that passwords, and the security that they provide, is just an arms race. Someone dreams up an "unbreakable" password scheme, and someone else breaks the scheme, then the first person attempts to close up the vulnerability, and some third person comes along and opens up a new vulnerability.

    In and of itself, a password can be "good enough" for most of our purposes. But, today, the NSA does indeed trivially break many if not most passwords. If the NSA has to devote significant resources to crack a password, then yeah, you have a pretty good password - but the NSA's resources grow and improve every year.

    I insist that passwords alone aren't enough, if you're really serious about security. 2fA and 3fA are either necessary today, or they will soon become necessary. Those who are NOT serious about security may disregard all of the above.

    Starting Score:    1  point
    Moderation   +1  
       Interesting=1, Total=1
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 0) by Anonymous Coward on Saturday November 02 2019, @06:49PM (1 child)

    by Anonymous Coward on Saturday November 02 2019, @06:49PM (#915076)

    This is wrong. Passwords are the best form of security overall, as long as they are implemented properly. There is no "arms race," not really. Passwords are as strong as the implementation they use, sometimes the implementation is weak. Good implementations are well understood and available freely. While many hashing functions eventually get broken, this comes with literally years of advance warning, making it easy to upgrade the hash.

    The biggest problem with passwords is the reuse of weak passwords, which requires the user to break two of the three characteristics that make up a good authentication factor for the sake of their convenience. System builders insisting on passwords that are easy for computers to break but hard for humans to remember is part of the problem as this encourages users to do just that.

    Even if you assume that password databases are always stolen, which isn't even a terrible assumption, they are still better than biometrics, which are equally easily stolen, except that a breach of your biometric data permanently breaks it forever no matter what you do. It's the same as if, after someone stole your password, instead of having to change it, you had to use that same password everywhere for the rest of your life.

    • (Score: 2) by Runaway1956 on Saturday November 02 2019, @07:02PM

      by Runaway1956 (2926) Subscriber Badge on Saturday November 02 2019, @07:02PM (#915082) Journal

      Wait a second, please. Let me be clear that I have NOT claimed that biometrics are somehow better than passwords. My only claim here, is that using both biometrics and a good password will improve your security. If I were to compare the relative virtues of biometrics and passwords, I would have to say that passwords are almost certainly better. As you say, don't use a weak password.

      The near ultimate security scheme? Biometrics unlocks the screen, which immediately asks you to enter your password. That is, no one should ever get to the log-in screen before the system screens them biometrically. Password taken care of - you're asked for your dongle thingie, whether it be a chip card, USB key, or whatever. Three factor authentication, and if you can't get one of the three, you don't get in.

      For the really ultimate in security, 3 successive failed attempts to access the system results in the device melting down irrecoverably. That was a concern when the FBI was trying to get into the phone from the Inland shooting incident.