Bypassing a Fingerprint Scanner?

We usually consider a fingerprint scanner like the evolution of password, “because it’s more convenient” and “because it’s safer.” But is it really so? During the Mobile World Congress 2016, CEO of Chinese company Vkansee did much talked about moving beyond the Touch ID an iPhone simply “replicating” your fingerprint on some pongo (era of Play-Doh, more malleable and soft regular pongo) and passing it on to the scanner. It didn’t work the first time around, but after a few tries the device it is unlocked.

To clarify, that the device in question was an iPhone or any other terminal would make little difference. The technology of fingerprint scanner is more or less similar.

The job functions is not in question. “Just” a bit of pongo applied on a finger of the owner. What seems to escape most is that, to obtain such an action serves an action extreme, physics. Not just a keylogger, or any other attack that could be driven by software: someone must personally deceive us or force us to put our finger in the pongo, or do it without our knowledge.

In short, it is certainly a scenario every day. The more that not always the fingerprint scanner is sufficient to unlock a device: Android, for example, attaches without exception to a password, PIN, or sequence must be entered as an additional security in certain situations that the system considers suspicious; IOS, however, allows for a maximum of five attempts wrong, then necessarily requires the PIN, etc.

In short, we “normal users” can feel reasonably safe, but it is clear that in ComputerGees environments is a valid concern. Fingerprint recognition technology can (and should) become even safer. How? For example, with a scanner integrated inside the glass, which does not require manufacturers to place a separate component (as shown by the case of Apple and the error 53), as that presented by the same Vkansee (coincidentally).

Not only the company’s scanner can read not only skin grooves which are the footprints, but also more accurate information as skin porosity, thickness and much more. And also works with the wet finger.

Gallery

Police Create 3D Mold of Dead Man’s Finger to Unlock …

Police Create 3D Mold of Dead Man's Finger to Unlock ...

Source: www.digitaltrends.com

PopYard:Today’s Tech.-Police create a 3D mold of a dead …

PopYard:Today's Tech.-Police create a 3D mold of a dead ...

Source: www.popyard.com

7 things to know about the Honor 5X

7 things to know about the Honor 5X

Source: www.androidcentral.com

MasterCard adds fingerprint scanner to credit cards …

MasterCard adds fingerprint scanner to credit cards ...

Source: www.itnews.com.au

LiveLeak.com

LiveLeak.com

Source: www.liveleak.com

Fraudulent apps on Apple’s App Store -Kaspersky Daily …

Fraudulent apps on Apple’s App Store -Kaspersky Daily ...

Source: usblog.kaspersky.com

Android M Will Take on iOS With Touch ID-Rivalling …

Android M Will Take on iOS With Touch ID-Rivalling ...

Source: www.gizmodo.co.uk

Putting My Ordinary DVD movies to Galaxy S8 Watching on …

Putting My Ordinary DVD movies to Galaxy S8 Watching on ...

Source: juliet-tech-rip-blurays-dvdss.hatenablog.com

YouTube video reveals an iPhone 6S Touch bug that uses …

YouTube video reveals an iPhone 6S Touch bug that uses ...

Source: www.dailymail.co.uk

7 things to know about the Honor 5X

7 things to know about the Honor 5X

Source: www.androidcentral.com

Lenovo Flaw Could Let Hackers Bypass Fingerprint Scanners …

Lenovo Flaw Could Let Hackers Bypass Fingerprint Scanners ...

Source: www.gizmodo.com.au

Security firm Bkav recommend users to not use Face ID for …

Security firm Bkav recommend users to not use Face ID for ...

Source: www.gizchina.com

Lenovo ThinkPad T400s

Lenovo ThinkPad T400s

Source: www.laptopmag.com

Tech News, Tips, Security Alerts & Digital Trends …

Tech News, Tips, Security Alerts & Digital Trends ...

Source: www.komando.com

Lg G3 Tutorial Bypass Lock Screen,security Password Pin …

Lg G3 Tutorial Bypass Lock Screen,security Password Pin ...

Source: wn.com

Biometrics: movies: 2009

Biometrics: movies: 2009

Source: biometrics.mainguet.org

Hack Like a Pro: How to Conduct OS Fingerprinting with …

Hack Like a Pro: How to Conduct OS Fingerprinting with ...

Source: null-byte.wonderhowto.com

Police obtain access to smartphone by 3D printing victims …

Police obtain access to smartphone by 3D printing victims ...

Source: www.borntoengineer.com

Xiaomi Mi A1 mod allows fingerprint unlock direct from …

Xiaomi Mi A1 mod allows fingerprint unlock direct from ...

Source: androidcommunity.com

Goodbye Password Hello Iris-Scanners

Goodbye Password Hello Iris-Scanners

Source: www.tgdaily.com