Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Well, it's a little different, because as far as I can tell he has reconstructed a 2D image of the fingerprint, but not used that fingerprint successfully for any authentication system.


I'm not sure that is accurate...

"As an example, he demonstrated how he could use his fake fingerprint to unlock his iPhone — that features a ‘Touch ID’ fingerprint sensor integrated into its home button."

http://www.iphonehacks.com/2014/12/hackers-reproduce-fingerp...

It isn't entirely clear which fake fingerprint was used. I guess we should probably watch the CCC talk.


> It isn't entirely clear which fake fingerprint was used.

Obviously his own fingerprint. He doesn't have access to the German Defense Minister iPhone to test the real one (assuming the Defense Minister uses an iPhone and has Touch ID configured).


Hehe well obviously not hers. What I meant was that it wasn't clear how he built the fake fingerprint he tested, whether he used the exact same method he used to construct the defense minister's fingerprint, or whether he "cheated" to make it easier on himself.


Ah haha, sorry, I misunderstood you. Yes, definitively the details of this are fundamental to know if this could work in non-ideal conditions -it's not the same to take a high res photo only of your finger with good lighting than use publicly available, normal photos.


Agreed, you worded it much more clearly than I did :)


The only fun thing here is that he pulled them off a photo. The Myth Busters guys did this a long while back with dusted prints ....

https://www.youtube.com/watch?v=3Hji3kp_i9k

Of course, things may have gotten better or worse since then.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: