Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 18 submissions in the queue.
posted by martyb on Saturday November 02 2019, @04:26AM   Printer-friendly
from the under-your-thumb dept.

Submitted via IRC for AndyTheAbsurd

Hackers Unlock Any Phone Using Photographed Fingerprints In Just 20 Minutes

According to the Chinese blog Abacus, Tencent's X-Lab team showed how this technique works at the recent GeekPwn 2019 hacking conference in Shanghai. X-Lab's leader Chen Yu asked an audience member to touch a glass and took a photo of the fingerprints.

Yu then ran the photo through an app they have developed in house, which extracts and process the necessary data to clone a physical fingerprint. The team didn't show the physical cloning process, but we can assume that they used a 3D printer like other people have done in the past. He then proceeded to use the cloned fingerprint to open three smartphones that had been registered with the audience member's fingerprint — plus two event registration machines that use fingerprint scanners.

[...] Each of those phones used one of the three existing fingerprint scanning technologies: capacitive, optical. and ultrasonic, like the one in the Samsung Galaxy S10. The latter one is especially worrying, since this technology is supposed to avoid this type of hack by scanning the three-dimensional structure of your fingerprint.

[...] In other words: fingerprint security sucks. And facial identification is not that much better, really. If you are really worried about security, the only thing you can do is probably use a longer password.

Still harder than shoulder-surfing or having no password, right?

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Saturday November 02 2019, @06:28PM

    by Anonymous Coward on Saturday November 02 2019, @06:28PM (#915073)

    "Something you are" is not an authentication factor. People like to pretend it is, but it isn't. Spreading this misconception is dangerous.

    To be an authentication factor, something must be :
    * difficult to copy
    * changeable
    * shared only with the entity you are authenticating with

    The first one is why passwords are encrypted. Security tokens are strong, passwords are strong under the right circumstances, and biometrics are mediocre.

    The second one is obviously strong for passwords, weak but possible for tokens, and a complete failure for biometrics.

    The third is strong for tokens, good for passwords if you don't reuse them, and again a complete failure for biometrics.

    Biometrics are weak on one count and a complete failure on the other two. The only advantage is that they "seem futuristic." That is not useful.