Could FBI Use San Bernardino Suspect’s Fingerprint to Unlock iPhone?





Susanne.Posel-Headline.News.Official- fingerprint.farook.apple.fbi.iphone.data_occupycorporatismSusanne Posel ,Chief Editor Occupy Corporatism | Co-Founder, Legacy Bio-Naturals

 

 

The macabre fact is that the Federal Bureau of Investigations (FBI) would have an easier time getting into the iPhone of San Bernardino shooter Syed Farook if they used his fingerprint to unlock the Apple TouchID authentication.

Fortunately, this concept has been tested by researchers on the iPhone 6 and 5S, using high-resolution images, glue and glycerol.

Fingerprints are physical evidence that can be compelled in a court room, and can override the objections of the accused. Another advantage is that “fingerprint data is frequently available through other government sources such as immigration registration databases or other government databases.”

Two years ago, a hacker speaking at a conference of the Chaos Computer Club (CCC) demonstrated how easy it is to replicate anyone’s fingerprint using commercial software and images taken of the fingerprint to be copied.

Hacker Jan Krissler presented a “cloned” picture of German Defense Minister Ursula von der Leyen’s fingerprint that was created from a “standard photo camera” pictures.

Despite the fact that Krissler did not have Leyen’s actual finger present when it was copied, the necessary biometrics needed for a facsimile were present in the photo.

The unintended revelation is that biometrics is highly “insecure”. From a public photo, Krissler used images of Leyen’s thumb from a public speech made in October of 2014.

Alan Woodward, professor and cybersecurity expert for Surrey University commented: “Biometrics that rely on static information like face recognition or fingerprints – it’s not trivial to forge them but most people have accepted that they are not a great form of security because they can be faked.”

Woodward continued: “People are starting to look for things where the biometric is alive – vein recognition in fingers, gait [body motion] analysis – they are also biometrics but they are chosen because the person has to be in possession of them and exhibiting them in real life.”

In 2012, a hacker from the CCC proved Apple wrong when the corporation insisted that their new iPhone 5S fingerprint sensor is “a convenient and highly secure way to access your phone.”

CCC stated that it is as easy as stealing a fingerprint from a drinking glass – and anyone can do it.

According to the hacker group: “The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple’s TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.”

Indeed, CCC stated: “First, the fingerprint of the enrolled user is photographed with 2400 dpi resolution. The resulting image is then cleaned up, inverted and laser printed with 1200 dpi onto transparent sheet with a thick toner setting. Finally, pink latex milk or white wood glue is smeared into the pattern created by the toner onto the transparent sheet. After it cures, the thin latex sheet is lifted from the sheet, breathed on to make it a tiny bit moist and then placed onto the sensor to unlock the phone. This process has been used with minor refinements and variations against the vast majority of fingerprint sensors on the market.”


Source Article from http://feedproxy.google.com/~r/OccupyCorporatism/~3/DLSZmuHyYkU/

You can leave a response, or trackback from your own site.

Leave a Reply

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes